Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-52999 (GCVE-0-2025-52999)
Vulnerability from cvelistv5
- CWE-121 - Stack-based Buffer Overflow
| Vendor | Product | Version | ||
|---|---|---|---|---|
| FasterXML | jackson-core |
Version: < 2.15.0 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-52999",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-25T18:04:07.206576Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-25T18:04:23.296Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "jackson-core",
"vendor": "FasterXML",
"versions": [
{
"status": "affected",
"version": "\u003c 2.15.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121: Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-25T17:02:57.428Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
},
{
"name": "https://github.com/FasterXML/jackson-core/pull/943",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/FasterXML/jackson-core/pull/943"
}
],
"source": {
"advisory": "GHSA-h46c-h94j-95f3",
"discovery": "UNKNOWN"
},
"title": "jackson-core Has Potential for StackoverflowError if user parses an input file that contains very deeply nested data"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-52999",
"datePublished": "2025-06-25T17:02:57.428Z",
"dateReserved": "2025-06-24T03:50:36.795Z",
"dateUpdated": "2025-06-25T18:04:23.296Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-52999\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-06-25T17:15:39.820\",\"lastModified\":\"2025-06-26T18:57:43.670\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"jackson-core contains core low-level incremental (\\\"streaming\\\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.\"},{\"lang\":\"es\",\"value\":\"jackson-core contiene las abstracciones principales del analizador incremental (\\\"streaming\\\") de bajo nivel y del generador utilizadas por Jackson Data Processor. En versiones anteriores a la 2.15.0, si un usuario analiza un archivo de entrada con datos profundamente anidados, Jackson pod\u00eda generar un error de Stackoverflow si la profundidad era excesiva. jackson-core 2.15.0 incluye un l\u00edmite configurable para la profundidad que Jackson recorrer\u00e1 en un documento de entrada, con una profundidad predeterminada de 1000. jackson-core generar\u00e1 una excepci\u00f3n StreamConstraintsException si se alcanza el l\u00edmite. jackson-databind tambi\u00e9n se beneficia de este cambio, ya que utiliza jackson-core para analizar las entradas JSON. Como soluci\u00f3n alternativa, se recomienda a los usuarios evitar analizar archivos de entrada de fuentes no confiables.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.7,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-121\"}]}],\"references\":[{\"url\":\"https://github.com/FasterXML/jackson-core/pull/943\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"jackson-core Has Potential for StackoverflowError if user parses an input file that contains very deeply nested data\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-121\", \"lang\": \"en\", \"description\": \"CWE-121: Stack-based Buffer Overflow\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV4_0\": {\"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"vulnConfidentialityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"baseScore\": 8.7, \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N\", \"version\": \"4.0\"}}], \"references\": [{\"name\": \"https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3\"}, {\"name\": \"https://github.com/FasterXML/jackson-core/pull/943\", \"tags\": [\"x_refsource_MISC\"], \"url\": \"https://github.com/FasterXML/jackson-core/pull/943\"}], \"affected\": [{\"vendor\": \"FasterXML\", \"product\": \"jackson-core\", \"versions\": [{\"version\": \"\u003c 2.15.0\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-06-25T17:02:57.428Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"jackson-core contains core low-level incremental (\\\"streaming\\\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources.\"}], \"source\": {\"advisory\": \"GHSA-h46c-h94j-95f3\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-52999\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-25T18:04:07.206576Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-25T18:04:19.172Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2025-52999\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2025-06-24T03:50:36.795Z\", \"datePublished\": \"2025-06-25T17:02:57.428Z\", \"dateUpdated\": \"2025-06-25T18:04:23.296Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
wid-sec-w-2025-1405
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Jackson ist eine quelloffene Bibliothek zur JSON-Verarbeitung in Java.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in FasterXML Jackson ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1405 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1405.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1405 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1405"
},
{
"category": "external",
"summary": "FasterXML GitHub Security Advisory vom 2025-06-25",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
},
{
"category": "external",
"summary": "Red Hat Bugtracker vom 2025-06-25",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10098 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10092 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10118 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10119 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10104 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10120 vom 2025-07-02",
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10097 vom 2025-07-01",
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11474 vom 2025-07-21",
"url": "https://access.redhat.com/errata/RHSA-2025:11474"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11473 vom 2025-07-21",
"url": "https://access.redhat.com/errata/RHSA-2025:11473"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12280 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12281 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12281"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12282 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12282"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12283 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12283"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2934 vom 2025-07-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2934.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12280 vom 2025-07-31",
"url": "https://linux.oracle.com/errata/ELSA-2025-12280.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14118 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14118"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14126 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14127 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14127"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14117 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14117"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14116 vom 2025-08-20",
"url": "https://access.redhat.com/errata/RHSA-2025:14116"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14126 vom 2025-08-25",
"url": "https://linux.oracle.com/errata/ELSA-2025-14126.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-14546 vom 2025-08-26",
"url": "https://oss.oracle.com/pipermail/el-errata/2025-August/018456.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2025:14126 vom 2025-09-08",
"url": "https://errata.build.resf.org/RLSA-2025:14126"
}
],
"source_lang": "en-US",
"title": "FasterXML Jackson: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2025-09-08T22:00:00.000+00:00",
"generator": {
"date": "2025-09-09T07:47:10.300+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1405",
"initial_release_date": "2025-06-25T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-25T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-07-01T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-21T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-24T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-26T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "10"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2.15.0",
"product": {
"name": "FasterXML Jackson \u003c2.15.0",
"product_id": "T044863"
}
},
{
"category": "product_version",
"name": "2.15.0",
"product": {
"name": "FasterXML Jackson 2.15.0",
"product_id": "T044863-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:fasterxml:jackson:2.15.0"
}
}
}
],
"category": "product_name",
"name": "Jackson"
}
],
"category": "vendor",
"name": "FasterXML"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Developer Tools and Services 4.14",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.14",
"product_id": "T031233",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.14"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.16",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.16",
"product_id": "T044977",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.16"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.17",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.17",
"product_id": "T044978",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.17"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.18",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.18",
"product_id": "T044979",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.18"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.15",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.15",
"product_id": "T044980",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.15"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.13",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.13",
"product_id": "T044981",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.13"
}
}
},
{
"category": "product_version",
"name": "Developer Tools and Services 4.12",
"product": {
"name": "Red Hat OpenShift Developer Tools and Services 4.12",
"product_id": "T044982",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:developer_tools_and_services_4.12"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"product_status": {
"known_affected": [
"T044863",
"T031233",
"T044977",
"67646",
"T044979",
"T044978",
"398363",
"T004914",
"T044980",
"T032255",
"T044982",
"T044981"
]
},
"release_date": "2025-06-25T22:00:00.000+00:00",
"title": "CVE-2025-52999"
}
]
}
rhsa-2025:12281
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12281",
"url": "https://access.redhat.com/errata/RHSA-2025:12281"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12281.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:39+00:00",
"generator": {
"date": "2025-10-23T23:58:39+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:12281",
"initial_release_date": "2025-07-30T09:53:38+00:00",
"revision_history": [
{
"date": "2025-07-30T09:53:38+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:53:38+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:39+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_4.src",
"product_id": "jackson-core-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_4.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_4.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_4?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:53:38+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12281"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:jackson-annotations-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-core-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-databind-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:jackson-modules-base-0:2.19.1-1.el9_4.src",
"AppStream-9.4.0.Z.EUS:pki-jackson-annotations-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-core-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-databind-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_4.noarch",
"AppStream-9.4.0.Z.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_4.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10118
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP\nTools 4.12. Red Hat Product Security has rated this update as having a\nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE\nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10118",
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10118.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.12 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:38+00:00",
"generator": {
"date": "2025-10-23T23:58:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:10118",
"initial_release_date": "2025-07-01T16:36:58+00:00",
"revision_history": [
{
"date": "2025-07-01T16:36:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:36:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.12",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.12::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750932984-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750932984-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.12.1750933270-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750932984-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.12.1750933270-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750932984-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750932984-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750932984-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.12",
"product_id": "8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.12.1750933270-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:36:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10118"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-0:2.504.2.1750932984-3.el8.src",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.noarch",
"8Base-OCP-Tools-4.12:jenkins-2-plugins-0:4.12.1750933270-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:12280
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12280",
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12280.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:38+00:00",
"generator": {
"date": "2025-10-23T23:58:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:12280",
"initial_release_date": "2025-07-30T09:55:57+00:00",
"revision_history": [
{
"date": "2025-07-30T09:55:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:55:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_6.src",
"product_id": "jackson-core-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_6.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_6.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_6?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_6?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_6?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:55:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12280"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:jackson-annotations-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-core-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-databind-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-jaxrs-providers-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:jackson-modules-base-0:2.19.1-1.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-annotations-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-core-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-databind-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_6.noarch",
"AppStream-9.6.0.Z.MAIN.EUS:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_6.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14126
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14126",
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14126.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:42+00:00",
"generator": {
"date": "2025-10-23T23:58:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:14126",
"initial_release_date": "2025-08-20T02:02:58+00:00",
"revision_history": [
{
"date": "2025-08-20T02:02:58+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T02:02:58+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.10.0%2B21035%2Ba01f6469?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.10.0%2B21257%2B2b5308b5?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=noarch\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-12.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.10.0%2B21035%2Ba01f6469?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.1-1.module%2Bel8.10.0%2B23380%2Bf6e7434b?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.10.0%2B21257%2B2b5308b5?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.10.0%2B20993%2Bd0f024b0?arch=src\u0026rpmmod=pki-deps:10.6:8100020250731151637:489197e6"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T02:02:58+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14126"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-collections-3.2.2-10.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-lang-2.6-21.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:apache-commons-net-3.6-3.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-1.2.0-16.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:bea-stax-api-1.2.0-16.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:fasterxml-oss-parent-69-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-fastinfoset-1.2.13-9.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-2.2.11-12.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-api-2.2.12-8.module+el8.10.0+21035+a01f6469.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-core-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-runtime-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:glassfish-jaxb-txw2-2.2.11-12.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-bom-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-core-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-databind-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-jaxrs-providers-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-modules-base-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jackson-parent-2.19.1-1.module+el8.10.0+23380+f6e7434b.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:jakarta-commons-httpclient-3.1-28.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-3.18.1-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:javassist-javadoc-3.18.1-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:pki-servlet-engine-9.0.62-1.module+el8.10.0+21257+2b5308b5.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:relaxngDatatype-2011.1-7.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-1.7.25-4.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:slf4j-jdk14-1.7.25-4.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:stax-ex-1.7.7-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:velocity-1.7-24.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xalan-j2-2.7.1-38.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xerces-j2-2.11.0-34.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-apis-1.4.01-25.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xml-commons-resolver-1.2-26.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xmlstreambuffer-1.5.4-8.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.noarch.rpm-pki-deps:10.6",
"AppStream-8.10.0.Z.MAIN.EUS:xsom-0-19.20110809svn.module+el8.10.0+20993+d0f024b0.src.rpm-pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14118
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14118",
"url": "https://access.redhat.com/errata/RHSA-2025:14118"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14118.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:42+00:00",
"generator": {
"date": "2025-10-23T23:58:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:14118",
"initial_release_date": "2025-08-20T00:25:33+00:00",
"revision_history": [
{
"date": "2025-08-20T00:25:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T00:25:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-4.0-api@9.0.30-3.module%2Bel8.6.0%2B23397%2B419fb810.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-3.module%2Bel8.6.0%2B23397%2B419fb810.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"product": {
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm (pki-deps:10.6)",
"product_id": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.6.0%2B23400%2Baafc0b27?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-2.module%2Bel8.6.0%2B23397%2B419fb810?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-3.module%2Bel8.6.0%2B23397%2B419fb810.2?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"product": {
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm (pki-deps:10.6)",
"product_id": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.6.0%2B23400%2Baafc0b27?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm (pki-deps:10.6)",
"product_id": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm (pki-deps:10.6)",
"product_id": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=aarch64\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6)",
"product_id": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6)",
"product_id": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6)",
"product_id": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm (pki-deps:10.6)",
"product_id": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm (pki-deps:10.6)",
"product_id": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm (pki-deps:10.6)",
"product_id": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=s390x\u0026rpmmod=pki-deps:10.6:8060020250815230318:ad008a3a"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T00:25:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14118"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.aarch64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.s390x.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:fasterxml-oss-parent-69-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-annotations-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-bom-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-core-2.19.1-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-jaxrs-providers-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jackson-parent-2.19.2-2.module+el8.6.0+23397+419fb810.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-4.0-api-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:pki-servlet-engine-9.0.30-3.module+el8.6.0+23397+419fb810.2.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:resteasy-3.0.26-6.module+el8.6.0+23400+aafc0b27.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.6.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10120
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.14. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10120",
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10120.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.14 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:42+00:00",
"generator": {
"date": "2025-10-23T23:58:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:10120",
"initial_release_date": "2025-07-01T16:53:09+00:00",
"revision_history": [
{
"date": "2025-07-01T16:53:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:53:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.14",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.14::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750903189-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750903189-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.14.1750903529-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750903189-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.14.1750903529-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750903189-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750903189-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750903189-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.14",
"product_id": "8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.14.1750903529-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.14"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:53:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10120"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-0:2.504.2.1750903189-3.el8.src",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.noarch",
"8Base-OCP-Tools-4.14:jenkins-2-plugins-0:4.14.1750903529-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:12283
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12283",
"url": "https://access.redhat.com/errata/RHSA-2025:12283"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12283.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:40+00:00",
"generator": {
"date": "2025-10-23T23:58:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:12283",
"initial_release_date": "2025-07-30T09:49:42+00:00",
"revision_history": [
{
"date": "2025-07-30T09:49:42+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:49:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_0.src",
"product_id": "jackson-core-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_0.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_0?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_0.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_0.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_0?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_0?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_0.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_0.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:49:42+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12283"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-core-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_0.src",
"AppStream-9.0.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_0.noarch",
"AppStream-9.0.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_0.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14116
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14116",
"url": "https://access.redhat.com/errata/RHSA-2025:14116"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14116.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:41+00:00",
"generator": {
"date": "2025-10-23T23:58:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:14116",
"initial_release_date": "2025-08-20T00:18:41+00:00",
"revision_history": [
{
"date": "2025-08-20T00:18:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T00:18:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-4.0-api@9.0.30-1.module%2Bel8.4.0%2B23391%2Bb488e6bf.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-1.module%2Bel8.4.0%2B23391%2Bb488e6bf.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm (pki-deps:10.6)",
"product_id": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.4.0%2B23399%2Bfc91639f?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-2.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.4.0%2B23391%2Bb488e6bf?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.30-1.module%2Bel8.4.0%2B23391%2Bb488e6bf.2?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"product": {
"name": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm (pki-deps:10.6)",
"product_id": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-6.module%2Bel8.4.0%2B23399%2Bfc91639f?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8040020250815231101:522a0ee4"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T00:18:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14116"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:fasterxml-oss-parent-69-3.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-annotations-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-bom-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-core-2.19.1-2.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-databind-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-json-provider-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-jaxrs-providers-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-module-jaxb-annotations-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-modules-base-2.19.1-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jackson-parent-2.19.2-1.module+el8.4.0+23391+b488e6bf.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-4.0-api-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:pki-servlet-engine-9.0.30-1.module+el8.4.0+23391+b488e6bf.2.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:resteasy-3.0.26-6.module+el8.4.0+23399+fc91639f.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.4.0.Z.EUS.EXTENSION:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:11474
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11474",
"url": "https://access.redhat.com/errata/RHSA-2025:11474"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11474.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4.23 security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:38+00:00",
"generator": {
"date": "2025-10-23T23:58:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:11474",
"initial_release_date": "2025-07-21T16:58:36+00:00",
"revision_history": [
{
"date": "2025-07-21T16:58:36+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-23T22:30:45+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product_id": "Red Hat JBoss Enterprise Application Platform 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-21T16:58:36+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11474"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10097
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.17. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10097",
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10097.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.17 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:37+00:00",
"generator": {
"date": "2025-10-23T23:58:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:10097",
"initial_release_date": "2025-07-01T14:30:33+00:00",
"revision_history": [
{
"date": "2025-07-01T14:30:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:30:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.17",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.17::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750851690-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750851690-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.17.1750851950-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750851690-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.17.1750851950-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750851690-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750851690-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750851690-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.17",
"product_id": "9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.17.1750851950-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.17"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:30:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10097"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-0:2.504.2.1750851690-3.el9.src",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.noarch",
"9Base-OCP-Tools-4.17:jenkins-2-plugins-0:4.17.1750851950-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:17189
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Logging for Red Hat OpenShift - 5.8.22",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Logging 5.8.22 is a cluster-wide logging solution for OpenShift that collects and manages applications, infrastructure, and audit logs.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:17189",
"url": "https://access.redhat.com/errata/RHSA-2025:17189"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-52999",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_17189.json"
}
],
"title": "Red Hat Security Advisory: Logging for Red Hat OpenShift - 5.8.22",
"tracking": {
"current_release_date": "2025-10-23T23:58:44+00:00",
"generator": {
"date": "2025-10-23T23:58:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:17189",
"initial_release_date": "2025-10-01T18:01:13+00:00",
"revision_history": [
{
"date": "2025-10-01T18:01:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-01T18:01:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Logging for Red Hat OpenShift 5.8",
"product": {
"name": "Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:logging:5.8::el9"
}
}
}
],
"category": "product_family",
"name": "Logging for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-operator-bundle@sha256%3A10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-operator-bundle@sha256%3A5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3A22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3Abf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3A6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3A13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3A7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3Af5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3A9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"product_id": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-operator-bundle@sha256%3Adf31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3A2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3Acec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485?arch=amd64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3A8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3A7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Ada617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3Ab4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3A08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3A3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3Aba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3Aa856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3A719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d?arch=arm64\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "arm64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3Ae497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3Ab8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3Af76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Aa474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3A8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3A6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3A3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3Ace751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3Ab169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3Ac3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3A5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3A90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751?arch=ppc64le\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"product_id": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"product_identification_helper": {
"purl": "pkg:oci/cluster-logging-rhel9-operator@sha256%3A3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-rhel9-operator@sha256%3A7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch-proxy-rhel9@sha256%3A5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"product_id": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"product_identification_helper": {
"purl": "pkg:oci/log-file-metric-exporter-rhel9@sha256%3Ab5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-curator5-rhel9@sha256%3A7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"product_id": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"product_identification_helper": {
"purl": "pkg:oci/elasticsearch6-rhel9@sha256%3A128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"product_id": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"product_identification_helper": {
"purl": "pkg:oci/eventrouter-rhel9@sha256%3Abba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"product_id": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"product_identification_helper": {
"purl": "pkg:oci/fluentd-rhel9@sha256%3Ae3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-loki-rhel9@sha256%3A593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"product_id": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"product_identification_helper": {
"purl": "pkg:oci/vector-rhel9@sha256%3A38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"product_id": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"product_identification_helper": {
"purl": "pkg:oci/logging-view-plugin-rhel9@sha256%3Aa49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"product_id": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"product_identification_helper": {
"purl": "pkg:oci/loki-rhel9-operator@sha256%3A107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"product_id": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"product_identification_helper": {
"purl": "pkg:oci/lokistack-gateway-rhel9@sha256%3Ab7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"product": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"product_id": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opa-openshift-rhel9@sha256%3Aeed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45?arch=s390x\u0026repository_url=registry.redhat.io/openshift-logging"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64 as a component of Logging for Red Hat OpenShift 5.8",
"product_id": "Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
},
"product_reference": "registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64",
"relates_to_product_reference": "Logging for Red Hat OpenShift 5.8"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le"
],
"known_not_affected": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-01T18:01:13+00:00",
"details": "For OpenShift Container Platform 4.14 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/ocp-4-14-release-notes\n\nFor Red Hat OpenShift Logging 5.8, see the following instructions to apply this update:\n\nhttps://docs.openshift.com/container-platform/4.14/logging/cluster-logging-upgrading.html",
"product_ids": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:17189"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-operator-bundle@sha256:10a834de128292c966d88931ffaed3a61138d7c370540aa56091ad809233b964_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:3159517ba1f092c4730b955e9ca19adb9f265c58efcc7c3287c59acdffcf2ff6_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:451e4a31954c189b3eef8bb9717d9c914b79b358db43db0bff0eb301d9d2cd58_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:5c52006c3c3aa0f30a9305aeacfdc056a79f1047e0f3f3b0ac45cb9563643b16_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/cluster-logging-rhel9-operator@sha256:e497f4bf649b9a2fa948dee1667b063b93a73050617faf42b80bf660f7552275_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-operator-bundle@sha256:5acbff74e14d6701f35ab8a6d47cf08c1921e6fa91e1cd71aff50316b94f42d5_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:5d50a98eaef00ad8fa611531722f0def17548b746d3623db565a9137a29f5303_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:7e68e42bb57424e64b1637f9ae579fd63a34c250fd4d35960124a0786d977737_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:bf4c3348b34042c159c931b6b5e61c7dd3f70113840d90fcf62d2f301162b544_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-proxy-rhel9@sha256:f76533b4c85fc4d53c544b50f542d4a0b5d1f27c8be8cf662a0a1174d93a398a_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:22bc15f1672a91599f46df3800621cdd8e0aca3f9bf7ffc93ae822057a0513e8_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:7d20fd3f48a1d566ad0407acefd783030eb975a5d8552190456096ec8794c76e_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:8cdcc1e7d115945f36b7ece850ba2aa4b8c666aca1e18281f55ac129876d656c_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch-rhel9-operator@sha256:b8cbb17dcbb6c731df2199be08b04064fb7f828f5186b144ff2ad9d54af3bccd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:128a6711150854305d7042e827d191cb5f136fa9591c2410279d9dc0f2b85a75_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:3dad38dd50e960647ea212947b27d8d6026690c61e5828013d4bcc5114216706_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:686e8e4c47246efa99c3284f1742cc948bdb2cb1ce0115721389a19242c8d27b_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/elasticsearch6-rhel9@sha256:9d271868ac0a01e0fb80829141456333d38308d3723d7c79e9319c7bb802a9cd_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:21949e68be95fe0767632ab00d23db3c3ff03ab11f5316bf0be0dc6325add56c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:2934b2ad2561de2781bcea3574309f66fd8c95dc9651f75e85ad2eac08b7b814_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:6d2c42b8ee388964f14733030ecb821e9066e5ae157eca20fdc9b68a5953bbb2_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/eventrouter-rhel9@sha256:bba408215e00bfe6fbc6d160aa2630ec038ff8239bdba1076e1da25d11880c21_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:08a3ff9da5debce7644f6e07d41fa816186ef9505212c09b06501a04049c61b5_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:3fcf3b22cf68e55c7ed13f9db9dc8408c5bca9a75ec763278e8a3e118e5c1410_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:7057594fd0d2b0ea1f7998d8c601c3c3c719a9a4fddbb0dfe8749422169a6d99_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/fluentd-rhel9@sha256:e3bfdeab36bcad90e60ad94c6b20ea0102198c7117e67ee31e52d2a41e377e0a_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:6d76394fa839d86b3973ad722decdf236fd46216d776fa8c39ff6a17a41b4a56_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:a474aa7df86477327b0b4d13fbfb0303723d81fc7de019a15e207238864aad13_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:b5ed6509786f8bb3173aecfdcd56553d0126a9034725d06fecc3c9d190f4b6f9_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/log-file-metric-exporter-rhel9@sha256:da617e0d22d0d8871e1f6c82e819d2f0baa5cc1da7735facf95a69af839e53dd_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:13e0b33a16fcd8d21a0aa9edb22629cd2efdcfbb0dc588382862766614ee7369_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:7145d597de3c4974831ca94ee180d333902fe47ec58aebd4917ecd4f0f68b51b_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:8f971d2b38f62671744185382fad7877b14c4496703b1f6b6249b090774c890c_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-curator5-rhel9@sha256:b4daad7d081075f6043986ba8473fea92858a8ba6c81269733a4471973dcb1d3_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:0ebfec4c761f2e008c1bb9ff782352a30ea087828ae6f87b41bce614e6e3808d_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:1ae6b377c9d1f1fcf7fb1ca0b5d5d04b6343e0224f0ab5105829ef3d0e7da837_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:593f83a2b0ac764e7399da9494857675a3b84bb61175acb3f6355d4f40aa6841_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-loki-rhel9@sha256:5d71aef6c8659da46892224a848461dcb4484babd4bed816e6e8a9adea97c681_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:9e6ec3a8ebeced1d9673a6fca997f961524a505c42edf2a9fe2cf227a1e1446c_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:a49fbcde560e1f47718971793314d8bc7beb5c60b553235292d3b3c2f5d60fbd_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:b169d6a3c9dfa04b95499a32fbc9d3321068e965e103425eca9b409e65f73a16_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/logging-view-plugin-rhel9@sha256:ba602bc1bdc386e0041ec60f59d10eacee9831191407546f72809f41a56d3c5e_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-operator-bundle@sha256:df31607f5081ef5c4c9ecd48ad7f9ec521c82bb84930bf92c8df9e920b2bbabd_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:107511201756a080e346348a545752bb2307ecf972b9d2512f8d107193beb3ac_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:39097f98b2277c1ccb22674d4afa9232b8ac06f80019c22b3bf7bec0ab917314_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:7772b7908ff4176fd1f508c432f2ff140437e3d8a7093d30c8abc137dcd2da91_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/loki-rhel9-operator@sha256:c3f7f9ac3d3282aa6e316b7f514e8ba86d7de32e59b4104871294a46c639e4ea_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:2978a477faf98f048c043e6f46e3831015f9af4b4c67fc04d5c29bff93284445_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:5a49302e675db6062a4a9995f017ec5c99c5c57bb26f725bc9b3e7d114ea8923_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:a856f7991481073f2b141b3df387f63b872154f538d6d7097672835e27178633_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/lokistack-gateway-rhel9@sha256:b7c02439519f9ae36cd5ee1ae673eccb2e4a2c8b587a8b7a3bcd46324b981aea_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:719892b24322beec1f2f04d959c967956e8dcab1db7a9425004c7774b696a27d_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:90e5728e6ff575ad46ac891e4b381e4d30acef1acd40ddc4c394184a61f86751_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:cec19f8bdab09437dc5b4b65dfa22083bc3a3c3fcd4b1e04e1da745689ec6485_amd64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/opa-openshift-rhel9@sha256:eed9da780a958c10da9f26bf9ebeed19f19dcfc8470dd2da8d62e54fd0cc0f45_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:38544593d67cf6df21c0b162661e966ee02b151c7a8378c8e7b55a4afab8fa02_s390x",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:3fa6a10b3b46d68dadf6a48955378a737c7387f7e5cbf5c4c444c2badeabdc29_arm64",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:ce751c82c0a5a269b8bacfb6aca521d3e1a42e44e6124157dbfe60a86c3b3559_ppc64le",
"Logging for Red Hat OpenShift 5.8:registry.redhat.io/openshift-logging/vector-rhel9@sha256:f5ba8e4b3f58ee60a44c631551fe420b46b459532b5f7c8afec1cad57f092295_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:11473
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11473",
"url": "https://access.redhat.com/errata/RHSA-2025:11473"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11473.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:38+00:00",
"generator": {
"date": "2025-10-23T23:58:38+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:11473",
"initial_release_date": "2025-07-21T17:07:33+00:00",
"revision_history": [
{
"date": "2025-07-21T17:07:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-21T17:07:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:38+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el7"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el8"
}
}
},
{
"category": "product_name",
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product": {
"name": "Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el7eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el8eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-providers@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el9eap?arch=src"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el9eap?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.23-4.GA_redhat_00003.1.el7eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.23-4.GA_redhat_00003.1.el8eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-annotations@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"product_id": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-core@2.12.7-2.SP1_redhat_00001.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-databind@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-base@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-jaxrs-json-provider@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-module-jaxb-annotations@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-base@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jdk8@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-datatype-jsr310@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_id": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-jackson-modules-java8@2.12.7-2.redhat_00004.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk11@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk17@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-java-jdk8@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-javadocs@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_id": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/eap7-wildfly-modules@7.4.23-4.GA_redhat_00003.1.el9eap?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 7 Server",
"product_id": "7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"relates_to_product_reference": "7Server-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 8",
"product_id": "8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"relates_to_product_reference": "8Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src"
},
"product_reference": "eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src"
},
"product_reference": "eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src"
},
"product_reference": "eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch as a component of Red Hat JBoss EAP 7.4 for RHEL 9",
"product_id": "9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
},
"product_reference": "eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"relates_to_product_reference": "9Base-JBEAP-7.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-21T17:07:33+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11473"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el7eap.src",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"7Server-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el7eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el8eap.src",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"8Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el8eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-annotations-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-core-0:2.12.7-2.SP1_redhat_00001.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-databind-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jdk8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-datatype-jsr310-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-json-provider-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-jaxrs-providers-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-module-jaxb-annotations-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-base-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-jackson-modules-java8-0:2.12.7-2.redhat_00004.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-0:7.4.23-4.GA_redhat_00003.1.el9eap.src",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk11-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk17-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-java-jdk8-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-javadocs-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch",
"9Base-JBEAP-7.4:eap7-wildfly-modules-0:7.4.23-4.GA_redhat_00003.1.el9eap.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:3467
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A security update is now available for Red Hat JBoss Enterprise Application Platform 7.4.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Enterprise Application Platform 7 is a platform for Java applications based on the WildFly application runtime.\n\nThis asynchronous patch is a security update for Red Hat JBoss Enterprise Application Platform 7.4.\n\nSecurity Fix(es):\n\n* io.netty/netty: Denial of Service attack on windows app using Netty (CVE-2024-47535)\n\n* netty-common: Denial of Service attack on windows app using Netty (CVE-2025-25193)\n\n* io.netty/netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine (CVE-2025-24970)\n\n* org.wildfly.core/wildfly-server: Wildfly improper RBAC permission (CVE-2025-23367)\n\n* hornetq-core-client: Arbitrarily overwrite files or access sensitive information Security (CVE-2024-51127)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgements, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:3467",
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_enterprise_application_platform/7.4/html-single/installation_guide/index"
},
{
"category": "external",
"summary": "2323697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323697"
},
{
"category": "external",
"summary": "2325538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325538"
},
{
"category": "external",
"summary": "2337620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337620"
},
{
"category": "external",
"summary": "2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "2344788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344788"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_3467.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 7.4 .21 security update",
"tracking": {
"current_release_date": "2025-10-24T00:00:57+00:00",
"generator": {
"date": "2025-10-24T00:00:57+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:3467",
"initial_release_date": "2025-04-01T13:06:47+00:00",
"revision_history": [
{
"date": "2025-04-01T13:06:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-23T23:12:14+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-24T00:00:57+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product": {
"name": "Red Hat JBoss Enterprise Application Platform 7",
"product_id": "Red Hat JBoss Enterprise Application Platform 7",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_enterprise_application_platform:7.4"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Enterprise Application Platform"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2024-11-12T16:01:18.772613+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2325538"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty. An unsafe reading of the environment file could potentially cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crashes.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: Denial of Service attack on windows app using Netty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-47535"
},
{
"category": "external",
"summary": "RHBZ#2325538",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325538"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-47535",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-47535"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3",
"url": "https://github.com/netty/netty/commit/fbf7a704a82e7449b48bd0bbb679f5661c6d61a3"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv",
"url": "https://github.com/netty/netty/security/advisories/GHSA-xq3w-v528-46rv"
}
],
"release_date": "2024-11-12T15:50:08.334000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: Denial of Service attack on windows app using Netty"
},
{
"cve": "CVE-2024-51127",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2024-11-04T18:00:59.553511+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2323697"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the createTempFile method of hornetq. Affected version of hornetq allows attackers to arbitrarily overwrite files or access sensitive information.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "hornetq-core-client: Arbitrarily overwrite files or access sensitive information",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-51127"
},
{
"category": "external",
"summary": "RHBZ#2323697",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2323697"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-51127",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51127"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-51127",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-51127"
},
{
"category": "external",
"summary": "http://hornetq.com",
"url": "http://hornetq.com"
},
{
"category": "external",
"summary": "https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md",
"url": "https://github.com/JAckLosingHeart/CWE-378/blob/main/CVE-2024-51127.md"
}
],
"release_date": "2024-11-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "There is currently no known mitigation for this vulnerability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "hornetq-core-client: Arbitrarily overwrite files or access sensitive information"
},
{
"acknowledgments": [
{
"names": [
"Claudia Bartolini",
"Marco Ventura",
"Massimiliano Brolli"
],
"organization": "TIM S.p.A"
}
],
"cve": "CVE-2025-23367",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2025-01-14T14:56:46.389000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2337620"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Wildfly Server Role Based Access Control (RBAC) provider. When authorization to control management operations is secured using the Role Based Access Control provider, a user without the required privileges can suspend or resume the server. A user with a Monitor or Auditor role is supposed to have only read access permissions and should not be able to suspend the server. \nThe vulnerability is caused by the Suspend and Resume handlers not performing authorization checks to validate whether the current user has the required permissions to proceed with the action.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "org.wildfly.core:wildfly-server: Wildfly improper RBAC permission",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has evaluated this issue and the attacker must be authenticated as a user that belongs to the \"Monitor\" or \"Auditor\" management groups. It requires previous privileges to jeopardize an environment.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-23367"
},
{
"category": "external",
"summary": "RHBZ#2337620",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2337620"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-23367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23367"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-23367",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-23367"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-qr6x-62gq-4ccp",
"url": "https://github.com/advisories/GHSA-qr6x-62gq-4ccp"
}
],
"release_date": "2025-01-30T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "org.wildfly.core:wildfly-server: Wildfly improper RBAC permission"
},
{
"cve": "CVE-2025-24970",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"discovery_date": "2025-02-10T23:00:52.785132+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344787"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty\u0027s SslHandler. This vulnerability allows a native crash via a specially crafted packet that bypasses proper validation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in Netty\u0027s SslHandler is of important severity rather than moderate because it directly impacts the stability and reliability of applications using native SSLEngine. By sending a specially crafted packet, an attacker can trigger a native crash, leading to a complete process termination. Unlike typical moderate vulnerabilities that might cause limited disruptions or require specific conditions, this flaw can be exploited remotely to induce a Denial of Service (DoS), affecting high-availability systems and mission-critical services.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-24970"
},
{
"category": "external",
"summary": "RHBZ#2344787",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344787"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-24970"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4",
"url": "https://github.com/netty/netty/commit/87f40725155b2f89adfde68c7732f97c153676c4"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw",
"url": "https://github.com/netty/netty/security/advisories/GHSA-4g8c-wm8x-jfhw"
}
],
"release_date": "2025-02-10T21:57:28.730000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "io.netty:netty-handler: SslHandler doesn\u0027t correctly validate packets which can lead to native crash when using native SSLEngine"
},
{
"cve": "CVE-2025-25193",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-02-10T23:00:54.794769+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344788"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Netty. An unsafe reading of the environment file could cause a denial of service. When loaded on a Windows application, Netty attempts to load a file that does not exist. If an attacker creates a large file, the Netty application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "netty: Denial of Service attack on windows app using Netty",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue only affects Windows environments, therefore, this would affect an environment when running a supported Red Hat JBoss EAP 7 or 8, for example, if running on Windows.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-400: Uncontrolled Resource Consumption vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat restricts access to all platform information by default, granting access only after successful hard token-based multi-factor authentication (MFA) and enforcing least privilege to ensure only authorized roles can execute or modify code. The environment employs malicious code protections, including IDS/IPS and antimalware tools to detect threats and monitor resource usage, helping prevent uncontrolled consumption that could lead to system failure. Additional safeguards, such as web application firewalls and load-balancing strategies, protect against resource exhaustion and performance degradation. Event logs are centrally collected, correlated, and analyzed to support monitoring, alerting, and retention, aiding in the detection of abnormal behavior and potential denial-of-service (DoS) conditions. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of input-based DoS attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-25193"
},
{
"category": "external",
"summary": "RHBZ#2344788",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344788"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-25193",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-25193"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386",
"url": "https://github.com/netty/netty/commit/d1fbda62d3a47835d3fb35db8bd42ecc205a5386"
},
{
"category": "external",
"summary": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx",
"url": "https://github.com/netty/netty/security/advisories/GHSA-389x-839f-4rhx"
}
],
"release_date": "2025-02-10T22:02:17.197000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "netty: Denial of Service attack on windows app using Netty"
},
{
"cve": "CVE-2025-48734",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"discovery_date": "2025-05-28T14:00:56.619771+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2368956"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Apache Commons BeanUtils. This vulnerability allows remote attackers to execute arbitrary code via uncontrolled access to the declaredClass property on Java enum objects, which can expose the class loader when property paths are passed from external sources to methods like getProperty() or getNestedProperty().",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum\u0027s declaredClass property by default",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as important severity because a flaw exists in Apache Commons BeanUtils, where PropertyUtilsBean and BeanUtilsBean allow uncontrolled access to the declaredClass property of Java enum objects. Applications that pass untrusted property paths directly to getProperty() or getNestedProperty() methods are at risk, as attackers can exploit this behavior to retrieve the ClassLoader instance and execute arbitrary code in the context of the affected application. This issue leads to compromise of confidentiality, integrity, and availability.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48734"
},
{
"category": "external",
"summary": "RHBZ#2368956",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2368956"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48734",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48734"
},
{
"category": "external",
"summary": "https://github.com/advisories/GHSA-wxr5-93ph-8wr9",
"url": "https://github.com/advisories/GHSA-wxr5-93ph-8wr9"
},
{
"category": "external",
"summary": "https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc",
"url": "https://github.com/apache/commons-beanutils/commit/28ad955a1613ed5885870cc7da52093c1ce739dc"
},
{
"category": "external",
"summary": "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9",
"url": "https://lists.apache.org/thread/s0hb3jkfj5f3ryx6c57zqtfohb0of1g9"
},
{
"category": "external",
"summary": "https://www.openwall.com/lists/oss-security/2025/05/28/6",
"url": "https://www.openwall.com/lists/oss-security/2025/05/28/6"
}
],
"release_date": "2025-05-28T13:32:08.300000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "commons-beanutils: Apache Commons BeanUtils: PropertyUtilsBean does not suppresses an enum\u0027s declaredClass property by default"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Enterprise Application Platform 7"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-01T13:06:47+00:00",
"details": "Before applying the update, make sure all previously released errata relevant to your system have been applied. Also, back up your existing installation, including all applications, configuration files, databases and database settings. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:3467"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Enterprise Application Platform 7"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14127
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14127",
"url": "https://access.redhat.com/errata/RHSA-2025:14127"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14127.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:43+00:00",
"generator": {
"date": "2025-10-23T23:58:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:14127",
"initial_release_date": "2025-08-20T04:16:28+00:00",
"revision_history": [
{
"date": "2025-08-20T04:16:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T04:16:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-4.0-api@9.0.7-16.module%2Bel8.2.0%2B23390%2B7631bd3f.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.7-16.module%2Bel8.2.0%2B23390%2B7631bd3f.2?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm-pki-deps:10.6",
"product": {
"name": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm (pki-deps:10.6)",
"product_id": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-3.module%2Bel8.2.0%2B23401%2B65186842?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-1.module%2Bel8.2.0%2B23390%2B7631bd3f?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.7-16.module%2Bel8.2.0%2B23390%2B7631bd3f.2?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm-pki-deps:10.6",
"product": {
"name": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm (pki-deps:10.6)",
"product_id": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-3.module%2Bel8.2.0%2B23401%2B65186842?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8020020250815231424:4cda2c84"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T04:16:28+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14127"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:fasterxml-oss-parent-69-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-bom-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-core-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-databind-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-json-provider-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-jaxrs-providers-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-modules-base-2.19.1-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jackson-parent-2.19.2-1.module+el8.2.0+23390+7631bd3f.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-4.0-api-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:pki-servlet-engine-9.0.7-16.module+el8.2.0+23390+7631bd3f.2.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:resteasy-3.0.26-3.module+el8.2.0+23401+65186842.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.2.0.Z.AUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10104
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.15. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10104",
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10104.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.15 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:37+00:00",
"generator": {
"date": "2025-10-23T23:58:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:10104",
"initial_release_date": "2025-07-01T14:56:03+00:00",
"revision_history": [
{
"date": "2025-07-01T14:56:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:56:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.15",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.15::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750856366-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750856366-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.15.1750856638-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750856366-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.15.1750856638-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750856366-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750856366-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750856366-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.15",
"product_id": "8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.15.1750856638-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.15"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:56:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10104"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-0:2.504.2.1750856366-3.el8.src",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.noarch",
"8Base-OCP-Tools-4.15:jenkins-2-plugins-0:4.15.1750856638-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:12282
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Core part of Jackson that defines Streaming API as well as basic shared abstractions.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12282",
"url": "https://access.redhat.com/errata/RHSA-2025:12282"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12282.json"
}
],
"title": "Red Hat Security Advisory: jackson-annotations, jackson-core, jackson-databind, jackson-jaxrs-providers, and jackson-modules-base security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:40+00:00",
"generator": {
"date": "2025-10-23T23:58:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:12282",
"initial_release_date": "2025-07-30T09:45:07+00:00",
"revision_history": [
{
"date": "2025-07-30T09:45:07+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T09:45:07+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "jackson-core-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-core-0:2.19.1-1.el9_2.src",
"product_id": "jackson-core-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-databind-0:2.19.1-1.el9_2.src",
"product_id": "jackson-databind-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"product_id": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"product_id": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.el9_2?arch=src"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-0:2.19.1-1.el9_2.src",
"product": {
"name": "jackson-annotations-0:2.19.1-1.el9_2.src",
"product_id": "jackson-annotations-0:2.19.1-1.el9_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-1.el9_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-core@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-databind@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-json-provider@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-jaxrs-providers@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-module-jaxb-annotations@2.19.1-1.el9_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"product": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"product_id": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-jackson-annotations@2.19.1-1.el9_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-annotations-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-core-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-databind-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-0:2.19.1-1.el9_2.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src"
},
"product_reference": "jackson-modules-base-0:2.19.1-1.el9_2.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-core-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
},
"product_reference": "pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T09:45:07+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12282"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:jackson-annotations-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-core-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-databind-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-jaxrs-providers-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:jackson-modules-base-0:2.19.1-1.el9_2.src",
"AppStream-9.2.0.Z.E4S:pki-jackson-annotations-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-core-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-databind-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-json-provider-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-jaxrs-providers-0:2.19.1-1.el9_2.noarch",
"AppStream-9.2.0.Z.E4S:pki-jackson-module-jaxb-annotations-0:2.19.1-1.el9_2.noarch"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10119
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat Product OCP \nTools 4.13. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10119",
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10119.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.13 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:42+00:00",
"generator": {
"date": "2025-10-23T23:58:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:10119",
"initial_release_date": "2025-07-01T16:31:24+00:00",
"revision_history": [
{
"date": "2025-07-01T16:31:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T16:31:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.13",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.13::el8"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product_id": "jenkins-0:2.504.2.1750916374-3.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750916374-3.el8?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product_id": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.13.1750916671-1.el8?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product_id": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750916374-3.el8?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product_id": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.13.1750916671-1.el8?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750916374-3.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750916374-3.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src"
},
"product_reference": "jenkins-0:2.504.2.1750916374-3.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src as a component of OpenShift Developer Tools and Services for OCP 4.13",
"product_id": "8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
},
"product_reference": "jenkins-2-plugins-0:4.13.1750916671-1.el8.src",
"relates_to_product_reference": "8Base-OCP-Tools-4.13"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T16:31:24+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10119"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-0:2.504.2.1750916374-3.el8.src",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.noarch",
"8Base-OCP-Tools-4.13:jenkins-2-plugins-0:4.13.1750916671-1.el8.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10092
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for Openshift Jenkins is now available for Red Hat Product OCP \nTools 4.18. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for\nCVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not\nenforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError\n(CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10092",
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10092.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.18 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:36+00:00",
"generator": {
"date": "2025-10-23T23:58:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:10092",
"initial_release_date": "2025-07-01T13:48:03+00:00",
"revision_history": [
{
"date": "2025-07-01T13:48:03+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T13:48:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.18",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.18::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750846524-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750846524-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.18.1750846854-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750846524-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.18.1750846854-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750846524-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750846524-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750846524-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.18",
"product_id": "9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.18.1750846854-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.18"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T13:48:03+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10092"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-0:2.504.2.1750846524-3.el9.src",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.noarch",
"9Base-OCP-Tools-4.18:jenkins-2-plugins-0:4.18.1750846854-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:15717
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "A new security update is now available for Red Hat Single Sign-On 7.6 from the Customer Portal.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat Single Sign-On 7.6 is a standalone server, based on the Keycloak project, that provides authentication and standards-based single sign-on capabilities for web and mobile applications.\n\nThis update to Red Hat Single Sign-On 7.6.12 includes a security update with important impact.\n\nSecurity fixes:\n* jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15717",
"url": "https://access.redhat.com/errata/RHSA-2025:15717"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15717.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Single Sign-On 7.6.12 security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:43+00:00",
"generator": {
"date": "2025-10-23T23:58:43+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:15717",
"initial_release_date": "2025-09-11T19:39:47+00:00",
"revision_history": [
{
"date": "2025-09-11T19:39:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-11T19:39:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:43+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Single Sign-On 7.6.12",
"product": {
"name": "Red Hat Single Sign-On 7.6.12",
"product_id": "Red Hat Single Sign-On 7.6.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:red_hat_single_sign_on:7.6"
}
}
}
],
"category": "product_family",
"name": "Red Hat Single Sign-On"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Single Sign-On 7.6.12"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-11T19:39:47+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"Red Hat Single Sign-On 7.6.12"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15717"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"Red Hat Single Sign-On 7.6.12"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Single Sign-On 7.6.12"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:10098
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for OpenShift Jenkins is now available for Red Hat Product OCP \nTools 4.16. Red Hat Product Security has rated this update as having a \nsecurity impact of important.\nA Common Vulnerability Scoring System (CVSS) base score, which gives a \ndetailed severity rating, is available for each vulnerability from the CVE \nlink(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Jenkins is a continuous integration server that monitors executions of \nrepeated jobs, such as building a software project or jobs run by cron.\n\nSecurity Fix(es):\n\n* jenkins-2-plugins: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370) (CVE-2024-57699)\n* jenkins: CVE-2025-22228: Spring Security BCryptPasswordEncoder does not enforce maximum password length (CVE-2025-22228)\n* jenkins: Jetty HTTP/2 Header List Size Vulnerability (CVE-2025-1948)\n* jenkins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n* jenkins-2-plugins: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS \nscore, acknowledgments, and other related information, refer to the CVE \npage listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10098",
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10098.json"
}
],
"title": "Red Hat Security Advisory: Red Hat Product OCP Tools 4.16 OpenShift Jenkins security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:37+00:00",
"generator": {
"date": "2025-10-23T23:58:37+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:10098",
"initial_release_date": "2025-07-01T14:34:48+00:00",
"revision_history": [
{
"date": "2025-07-01T14:34:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-01T14:34:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:37+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "OpenShift Developer Tools and Services for OCP 4.16",
"product": {
"name": "OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:ocp_tools:4.16::el9"
}
}
}
],
"category": "product_family",
"name": "OpenShift Jenkins"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product_id": "jenkins-0:2.504.2.1750857144-3.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750857144-3.el9?arch=src"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product_id": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.16.1750857315-1.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product_id": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins@2.504.2.1750857144-3.el9?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product_id": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jenkins-2-plugins@4.16.1750857315-1.el9?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch"
},
"product_reference": "jenkins-0:2.504.2.1750857144-3.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-0:2.504.2.1750857144-3.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src"
},
"product_reference": "jenkins-0:2.504.2.1750857144-3.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch"
},
"product_reference": "jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src as a component of OpenShift Developer Tools and Services for OCP 4.16",
"product_id": "9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
},
"product_reference": "jenkins-2-plugins-0:4.16.1750857315-1.el9.src",
"relates_to_product_reference": "9Base-OCP-Tools-4.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"discovery_date": "2025-02-05T22:01:26.352808+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2344073"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the JSON-smart library. In affected versions, specially crafted JSON input may trigger stack exhaustion, potentially leading to an application crash or denial of service. This issue exists due to an incomplete fix for CVE-2023-1370.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue exists because of an incomplete fix for CVE-2023-1370, therefore it only affects json-smart v2.5.0 through v2.5.1 (inclusive).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-57699"
},
{
"category": "external",
"summary": "RHBZ#2344073",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2344073"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699",
"url": "https://github.com/TurtleLiu/Vul_PoC/tree/main/CVE-2024-57699"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/cve-2023-1370",
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-1370"
}
],
"release_date": "2025-02-05T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "json-smart: Potential DoS via stack exhaustion (incomplete fix for CVE-2023-1370)"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"discovery_date": "2025-05-08T18:00:52.156301+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2365137"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Eclipse Jetty. This vulnerability allows denial of service attack via an HTTP/2 client specifying a very large value for the SETTINGS_MAX_HEADER_LIST_SIZE parameter.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-1948"
},
{
"category": "external",
"summary": "RHBZ#2365137",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2365137"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-1948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1948"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-1948"
},
{
"category": "external",
"summary": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
"url": "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8"
},
{
"category": "external",
"summary": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
"url": "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56"
}
],
"release_date": "2025-05-08T17:48:40.831000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "jetty-http2-common: Jetty HTTP/2 Header List Size Vulnerability"
},
{
"cve": "CVE-2025-22228",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"discovery_date": "2025-03-20T06:00:45.196050+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2353507"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the spring-security-core password encoder. This vulnerability allows incorrect password matching via input manipulation.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-22228"
},
{
"category": "external",
"summary": "RHBZ#2353507",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2353507"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22228"
},
{
"category": "external",
"summary": "https://spring.io/security/cve-2025-22228",
"url": "https://spring.io/security/cve-2025-22228"
}
],
"release_date": "2025-03-20T05:49:19.275000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "Red Hat Product Security does not have a recommended mitigation at this time.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "spring-security-core: Spring Security BCryptPasswordEncoder does not enforce maximum password length"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-01T14:34:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10098"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-0:2.504.2.1750857144-3.el9.src",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.noarch",
"9Base-OCP-Tools-4.16:jenkins-2-plugins-0:4.16.1750857315-1.el9.src"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
rhsa-2025:14117
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for the pki-deps:10.6 module is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The Public Key Infrastructure (PKI) Core contains fundamental packages required by Red Hat Certificate System.\n\nSecurity Fix(es):\n\n* com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError (CVE-2025-52999)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:14117",
"url": "https://access.redhat.com/errata/RHSA-2025:14117"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_14117.json"
}
],
"title": "Red Hat Security Advisory: pki-deps:10.6 security update",
"tracking": {
"current_release_date": "2025-10-23T23:58:41+00:00",
"generator": {
"date": "2025-10-23T23:58:41+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2025:14117",
"initial_release_date": "2025-08-20T00:22:33+00:00",
"revision_history": [
{
"date": "2025-08-20T00:22:33+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-20T00:22:33+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-23T23:58:41+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6)",
"product_id": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax-api@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-core@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-runtime@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-txw2@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-4.module%2Bel8.8.0%2B23413%2B86800787?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-4.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-json-provider@2.19.1-2.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-2.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-module-jaxb-annotations@2.19.1-1.module%2Bel8.8.0%2B23405%2B763e93bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.8.0%2B23405%2B763e93bf?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-3.module%2Bel8.8.0%2B23413%2B86800787?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist-javadoc@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.8.0%2B22367%2B4894538d?arch=noarch\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"product": {
"name": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm (pki-deps:10.6)",
"product_id": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-7.module%2Bel8.8.0%2B22365%2Bb433a336?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j-jdk14@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=noarch\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-collections@3.2.2-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-lang@2.6-21.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"product": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6)",
"product_id": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/apache-commons-net@3.6-3.module%2Bel8.3.0%2B6805%2B72837426?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/bea-stax@1.2.0-16.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product": {
"name": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6)",
"product_id": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/fasterxml-oss-parent@69-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-fastinfoset@1.2.13-9.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb@2.2.11-11.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/glassfish-jaxb-api@2.2.12-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6)",
"product_id": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-annotations@2.19.1-3.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm (pki-deps:10.6)",
"product_id": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-bom@2.19.1-4.module%2Bel8.8.0%2B23413%2B86800787?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6)",
"product_id": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-core@2.19.1-4.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6)",
"product_id": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-databind@2.19.1-1.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6)",
"product_id": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-jaxrs-providers@2.19.1-2.module%2Bel8.8.0%2B23396%2Bb3893f62?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm (pki-deps:10.6)",
"product_id": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-modules-base@2.19.1-1.module%2Bel8.8.0%2B23405%2B763e93bf?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"product": {
"name": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm (pki-deps:10.6)",
"product_id": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jackson-parent@2.19.2-3.module%2Bel8.8.0%2B23413%2B86800787?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/jakarta-commons-httpclient@3.1-28.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/javassist@3.18.1-8.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"product": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm (pki-deps:10.6)",
"product_id": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/pki-servlet-engine@9.0.62-1.module%2Bel8.8.0%2B22367%2B4894538d?arch=src\u0026epoch=1\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/relaxngDatatype@2011.1-7.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"product": {
"name": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm (pki-deps:10.6)",
"product_id": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/resteasy@3.0.26-7.module%2Bel8.8.0%2B22365%2Bb433a336?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/slf4j@1.7.25-4.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6)",
"product_id": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/stax-ex@1.7.7-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/velocity@1.7-24.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xalan-j2@2.7.1-38.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xerces-j2@2.11.0-34.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-apis@1.4.01-25.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xml-commons-resolver@1.2-26.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6)",
"product_id": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xmlstreambuffer@1.5.4-8.module%2Bel8.2.0%2B5723%2B4574fbff?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6)",
"product_id": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/xsom@0-19.20110809svn.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=src\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6)",
"product_id": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6)",
"product_id": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6)",
"product_id": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=ppc64le\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-debugsource@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python-nss-doc@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
},
{
"category": "product_version",
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6)",
"product_id": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-nss-debuginfo@1.0.1-10.module%2Bel8.1.0%2B3366%2B6dfb954c?arch=x86_64\u0026rpmmod=pki-deps:10.6:8080020250815110412:63b34585"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6"
},
"product_reference": "apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6"
},
"product_reference": "jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6"
},
"product_reference": "pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6"
},
"product_reference": "python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6"
},
"product_reference": "resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6"
},
"product_reference": "xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm (pki-deps:10.6) as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
},
"product_reference": "xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-25T18:00:54.693716+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2374804"
}
],
"notes": [
{
"category": "description",
"text": "A nested data handling flaw was found in Jackson Core. When parsing particularly deeply nested data structures, a StackoverflowError can occur.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-52999"
},
{
"category": "external",
"summary": "RHBZ#2374804",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2374804"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/pull/943",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"category": "external",
"summary": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"release_date": "2025-06-25T17:02:57.428000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-20T00:22:33+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:14117"
},
{
"category": "workaround",
"details": "To mitigate this vulnerability, the recommendation is to avoid parsing input files from untrusted sources that may have excessively deep nested data structures; anything with a depth over 1000.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.ppc64le.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.E4S:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-collections-3.2.2-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-lang-2.6-21.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:apache-commons-net-3.6-3.module+el8.3.0+6805+72837426.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-1.2.0-16.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:bea-stax-api-1.2.0-16.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:fasterxml-oss-parent-69-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-fastinfoset-1.2.13-9.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-2.2.11-11.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-api-2.2.12-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-core-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-runtime-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:glassfish-jaxb-txw2-2.2.11-11.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-annotations-2.19.1-3.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-bom-2.19.1-4.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-core-2.19.1-4.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-databind-2.19.1-1.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-json-provider-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-jaxrs-providers-2.19.1-2.module+el8.8.0+23396+b3893f62.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-module-jaxb-annotations-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-modules-base-2.19.1-1.module+el8.8.0+23405+763e93bf.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jackson-parent-2.19.2-3.module+el8.8.0+23413+86800787.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:jakarta-commons-httpclient-3.1-28.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-3.18.1-8.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:javassist-javadoc-3.18.1-8.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:pki-servlet-engine-9.0.62-1.module+el8.8.0+22367+4894538d.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-debugsource-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python-nss-doc-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:python3-nss-debuginfo-1.0.1-10.module+el8.1.0+3366+6dfb954c.x86_64.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:relaxngDatatype-2011.1-7.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:resteasy-3.0.26-7.module+el8.8.0+22365+b433a336.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-1.7.25-4.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:slf4j-jdk14-1.7.25-4.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:stax-ex-1.7.7-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:velocity-1.7-24.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xalan-j2-2.7.1-38.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xerces-j2-2.11.0-34.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-apis-1.4.01-25.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xml-commons-resolver-1.2-26.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xmlstreambuffer-1.5.4-8.module+el8.2.0+5723+4574fbff.src.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.noarch.rpm-pki-deps:10.6",
"AppStream-8.8.0.Z.TUS:xsom-0-19.20110809svn.module+el8.1.0+3366+6dfb954c.src.rpm-pki-deps:10.6"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "com.fasterxml.jackson.core/jackson-core: jackson-core Potential StackoverflowError"
}
]
}
ncsc-2025-0330
Vulnerability from csaf_ncscnl
Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communications producten, waaronder de Unified Assurance en Cloud Native Core.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden in de Oracle Communications producten stellen kwaadwillenden in staat om ongeautoriseerde toegang te verkrijgen, wat kan leiden tot gedeeltelijke of volledige Denial-of-Service (DoS) aanvallen. Specifiek kunnen aanvallers met netwerktoegang de systemen compromitteren, wat resulteert in ongeautoriseerde toegang tot gevoelige gegevens. De CVSS-scores van deze kwetsbaarheden vari\u00ebren van 3.1 tot 9.8, wat wijst op een breed scala aan risico\u0027s, van beperkte tot ernstige impact op de vertrouwelijkheid, integriteit en beschikbaarheid van de systemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden in zijn Communications producten te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "general",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "general",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "general",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "general",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "general",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Comparison",
"title": "CWE-697"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "general",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "general",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications producten",
"tracking": {
"current_release_date": "2025-10-23T13:20:15.363063Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2025-0330",
"initial_release_date": "2025-10-23T13:20:15.363063Z",
"revision_history": [
{
"date": "2025-10-23T13:20:15.363063Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Communications Cloud Native Core Console"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "Management Cloud Engine"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-3"
}
}
],
"category": "product_name",
"name": "Oracle Communications Billing and Revenue Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-4"
}
}
],
"category": "product_name",
"name": "Oracle Communications Calendar Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-5"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Automated Test Suite"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-6"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Binding Support Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-7"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Certificate Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-8"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core DBTier"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-9"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Function Cloud Native Environment"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-10"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Repository Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-11"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Network Slice Selection Function"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-12"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Policy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-13"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Security Edge Protection Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-14"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Service Communication Proxy"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-15"
}
}
],
"category": "product_name",
"name": "Oracle Communications Cloud Native Core Unified Data Repository"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-16"
}
}
],
"category": "product_name",
"name": "Oracle Communications Converged Charging System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-17"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergence"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-18"
}
}
],
"category": "product_name",
"name": "Oracle Communications Convergent Charging Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-19"
}
}
],
"category": "product_name",
"name": "Oracle Communications Diameter Signaling Router"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-20"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE Element Management System"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-21"
}
}
],
"category": "product_name",
"name": "Oracle Communications EAGLE LNP Application Processor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-22"
}
}
],
"category": "product_name",
"name": "Oracle Communications LSMS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-23"
}
}
],
"category": "product_name",
"name": "Oracle Communications Messaging Server"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-24"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Analytics Data Director"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-25"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Charging and Control"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-26"
}
}
],
"category": "product_name",
"name": "Oracle Communications Network Integrity"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-27"
}
}
],
"category": "product_name",
"name": "Oracle Communications Offline Mediation Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-28"
}
}
],
"category": "product_name",
"name": "Oracle Communications Operations Monitor"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-29"
}
}
],
"category": "product_name",
"name": "Oracle Communications Order and Service Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-30"
}
}
],
"category": "product_name",
"name": "Oracle Communications Pricing Design Center"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-31"
}
}
],
"category": "product_name",
"name": "Oracle Communications Service Catalog and Design"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-32"
}
}
],
"category": "product_name",
"name": "Oracle Communications Session Border Controller"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-33"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Assurance"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-34"
}
}
],
"category": "product_name",
"name": "Oracle Communications Unified Inventory Management"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-35"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Communications Broker"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-36"
}
}
],
"category": "product_name",
"name": "Oracle Enterprise Operations Monitor"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-26555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "description",
"text": "Recent updates address vulnerabilities in NTP 4.2.8p17 and Oracle products, including CVE-2023-26555 related to malformed RT-11 dates and various security issues in Oracle Communications and Database systems.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-26555 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2023/cve-2023-26555.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple vulnerabilities across various Oracle, IBM, and Protobuf products could lead to Denial of Service and unauthorized access, with significant risks identified in versions of Oracle Communications, MySQL Connector/J, and IBM WebSphere.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle Communications products and the libpcap library allow high-privileged attackers to cause denial of service and NULL pointer dereference issues, with CVSS scores of 4.4 for the former.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-12133",
"cwe": {
"id": "CWE-407",
"name": "Inefficient Algorithmic Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Algorithmic Complexity",
"title": "CWE-407"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Communications EAGLE LNP Application Processor, Oracle Communications Cloud Native Core Policy, and libtasn1 could lead to denial of service attacks, with CVSS scores of 5.3 for some products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-12133 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-12133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-12133"
},
{
"cve": "CVE-2024-28182",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Detection of Error Condition Without Action",
"title": "CWE-390"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle MySQL, Oracle Communications, and nghttp2 products allow remote attackers to exploit confidentiality, integrity, and availability, with varying damage ratings from medium to high.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28182 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-28182.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-28182"
},
{
"cve": "CVE-2024-35164",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Array Index",
"title": "CWE-129"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Assurance and Apache Guacamole could allow high-privileged attackers to compromise systems and execute arbitrary code, respectively.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35164 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-35164.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-35164"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle products, including Communications and MySQL, as well as MIT Kerberos 5, allow for unauthorized access, denial of service, and other malicious activities, with CVSS scores reaching 9.1.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Middleware, Documaker, and Apache Commons IO components allow unauthenticated attackers to exploit denial of service risks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-50609",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "description",
"text": "Fluent Bit 3.1.9 has a vulnerability allowing remote Denial of Service attacks via a zero-length packet, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 can be exploited by high-privileged attackers for complete Denial of Service.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50609 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-50609.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-50609"
},
{
"cve": "CVE-2024-51504",
"cwe": {
"id": "CWE-290",
"name": "Authentication Bypass by Spoofing"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass by Spoofing",
"title": "CWE-290"
},
{
"category": "description",
"text": "Recent vulnerabilities in Apache ZooKeeper and Oracle Communications Unified Assurance expose systems to authentication bypass and unauthorized access, allowing attackers to execute commands and access critical data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-51504 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-51504.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-51504"
},
{
"cve": "CVE-2024-57699",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Multiple security vulnerabilities across various Oracle products and the Netplex Json-smart library can lead to Denial of Service (DoS) due to stack exhaustion and other exploits, affecting versions 2.5.0 to 2.5.1 and specific Oracle software.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-57699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-57699.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2024-57699"
},
{
"cve": "CVE-2025-1948",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Eclipse Jetty versions 12.0.0 to 12.0.16 are vulnerable to OutOfMemoryError and denial of service attacks due to improper validation of the SETTINGS_MAX_HEADER_LIST_SIZE parameter, affecting various products including Oracle Communications EAGLE and NetApp.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-1948 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-1948.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-1948"
},
{
"cve": "CVE-2025-3576",
"cwe": {
"id": "CWE-328",
"name": "Use of Weak Hash"
},
"notes": [
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "description",
"text": "Recent vulnerabilities in krb5 and MIT Kerberos implementations allow for message spoofing via MD5 checksum weaknesses, while Oracle Communications Network Analytics Data Director is susceptible to unauthorized data manipulation through SSH access.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-3576 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-3576.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-3576"
},
{
"cve": "CVE-2025-4373",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Underwrite (\u0027Buffer Underflow\u0027)",
"title": "CWE-124"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and glib2 involve unauthorized access risks and buffer overflow issues, affecting multiple products with varying severity levels.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4373 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4373.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L/E:U",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-4517",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Recent updates to Python versions 3.6 through 3.13.5 address multiple security vulnerabilities, particularly in the tarfile module, while enhancing various functionalities and resolving issues related to memory management and IPv6 handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4517 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4517.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.4,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4517"
},
{
"cve": "CVE-2025-4802",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"category": "other",
"text": "Untrusted Search Path",
"title": "CWE-426"
},
{
"category": "description",
"text": "Vulnerabilities in Oracle Communications Cloud Native Core and glibc allow unauthenticated access and privilege escalation, with CVSS scores of 7.8, affecting confidentiality, integrity, and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-4802 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-4802.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-4802"
},
{
"cve": "CVE-2025-5115",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "The \u0027MadeYouReset\u0027 vulnerability in HTTP/2 affects certain Jetty versions, allowing denial of service through malformed control frames, while additional vulnerabilities exist in Oracle Communications and SAP Commerce Cloud.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:N/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5115 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5115.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5115"
},
{
"cve": "CVE-2025-5318",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle MySQL Workbench and the libssh library expose sensitive data and allow unauthorized access, with CVSS scores indicating moderate severity.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5318 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5318.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5318"
},
{
"cve": "CVE-2025-5399",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "description",
"text": "Multiple vulnerabilities in Oracle MySQL Server and Cluster, along with libcurl\u0027s WebSocket code, allow for various denial of service attacks, with CVSS scores ranging from 4.3 to 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5399 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5399.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5399"
},
{
"cve": "CVE-2025-5889",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "The juliangruber brace-expansion library has a vulnerability in versions up to 4.0.0 affecting the expand function, while Oracle Communications Unified Assurance versions 6.1.0-6.1.1 are susceptible to a partial denial of service by low-privileged attackers.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5889 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-5889.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-5889"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"notes": [
{
"category": "other",
"text": "Numeric Truncation Error",
"title": "CWE-197"
},
{
"category": "description",
"text": "Critical vulnerabilities in Oracle Communications Cloud Native Core and SQLite versions prior to 3.50.2 expose systems to severe risks, including memory corruption and integer truncation issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:L/UI:N/VC:L/VI:H/VA:L/SC:L/SI:H/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:N/R:U/V:D/RE:L/U:Green",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-6965 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-6965.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-7339",
"cwe": {
"id": "CWE-241",
"name": "Improper Handling of Unexpected Data Type"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Unexpected Data Type",
"title": "CWE-241"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing unauthorized data access, while the on-headers middleware for Node.js has a bug affecting response header modifications in versions prior to 1.1.0.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7339 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7339.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7339"
},
{
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core and libxslt expose systems to unauthorized access and memory corruption, with significant impacts on integrity and availability.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7425 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7425.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7425"
},
{
"cve": "CVE-2025-7962",
"cwe": {
"id": "CWE-147",
"name": "Improper Neutralization of Input Terminators"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input Terminators",
"title": "CWE-147"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Console and Jakarta Mail versions 2.0.2 and 2.2 expose systems to significant risks, including unauthorized access and SMTP Injection attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:L/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-7962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-7962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-7962"
},
{
"cve": "CVE-2025-8058",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Enterprise Operations Monitor and GNU C library versions 2.4 to 2.41 expose systems to potential unauthorized access, memory corruption, and denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:P/VC:L/VI:L/VA:H/SC:L/SI:L/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8058 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8058.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8058"
},
{
"cve": "CVE-2025-8916",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Bouncy Castle for Java and BCPKIX FIPS have a vulnerability allowing excessive resource allocation, while Oracle Communications Cloud Native Core Certificate Management and certain NetApp products face denial of service risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/S:P/R:U/RE:M/U:Amber",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-8916 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-8916.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-8916"
},
{
"cve": "CVE-2025-9086",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "The curl update 8.14.1 addresses security vulnerabilities, including out-of-bounds reads, proxy cache poisoning, and a bug allowing insecure sites to override secure cookies, alongside a denial of service vulnerability in Oracle Communications Unified Inventory Management.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-9086 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-9086.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-9086"
},
{
"cve": "CVE-2025-25724",
"cwe": {
"id": "CWE-252",
"name": "Unchecked Return Value"
},
"notes": [
{
"category": "other",
"text": "Unchecked Return Value",
"title": "CWE-252"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Communications Network Analytics Data Director and the libarchive component, affecting system integrity and availability, with CVSS scores indicating significant risks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-25724 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-25724.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-25724"
},
{
"cve": "CVE-2025-27210",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "Node.js versions 20.x, 22.x, and 24.x have an incomplete fix for CVE-2025-23084 affecting Windows device names and the `path.join` API, while Oracle Communications\u0027 Cloud Native Environment has a non-exploitable Security-in-Depth issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27210 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27210.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27210"
},
{
"cve": "CVE-2025-27533",
"cwe": {
"id": "CWE-789",
"name": "Memory Allocation with Excessive Size Value"
},
"notes": [
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache ActiveMQ and Oracle products allow for denial of service attacks due to improper validation and excessive memory allocation, affecting various versions and configurations.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:A/V:D/RE:M/U:Red",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27533 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27533.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27533"
},
{
"cve": "CVE-2025-27553",
"cwe": {
"id": "CWE-23",
"name": "Relative Path Traversal"
},
"notes": [
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Middleware and Apache Commons VFS expose critical data and allow unauthorized file access, with significant risks associated with their exploitation.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27553 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27553.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27553"
},
{
"cve": "CVE-2025-27587",
"cwe": {
"id": "CWE-385",
"name": "Covert Timing Channel"
},
"notes": [
{
"category": "other",
"text": "Covert Timing Channel",
"title": "CWE-385"
},
{
"category": "description",
"text": "OpenSSL versions 3.0.0 to 3.3.2 on PowerPC are vulnerable to a Minerva attack, while Oracle Communications Cloud Native Core Certificate Management 25.1.200 has a critical data access vulnerability, and OpenSSL 3 has addressed timing side channel issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27587 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27587.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27587"
},
{
"cve": "CVE-2025-27817",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Apache Kafka and Oracle applications allow unauthorized access to sensitive data, with notable SSRF risks and CVSS scores of 7.5 for Oracle products.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-27817 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-27817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-27817"
},
{
"cve": "CVE-2025-32415",
"cwe": {
"id": "CWE-1284",
"name": "Improper Validation of Specified Quantity in Input"
},
"notes": [
{
"category": "other",
"text": "Improper Validation of Specified Quantity in Input",
"title": "CWE-1284"
},
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities have been identified in Oracle Java SE and libxml2, allowing for potential system compromise and denial of service, with CVSS scores of 7.5 for several issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32415 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32415.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-32728",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "description",
"text": "Multiple vulnerabilities across Oracle Enterprise Communications Broker, OpenSSH, and HP-UX Secure Shell daemon could lead to unauthorized data access and system compromise, with varying CVSS scores and exploitation potential.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32728 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32728.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32728"
},
{
"cve": "CVE-2025-32990",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Unified Inventory Management and GnuTLS\u0027s certtool expose systems to denial-of-service and unauthorized data access, with significant integrity impacts and a CVSS score of 8.2 for Oracle\u0027s flaw.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-32990 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-32990.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-32990"
},
{
"cve": "CVE-2025-48734",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "description",
"text": "Recent updates to Apache Commons BeanUtils address multiple vulnerabilities, including arbitrary code execution risks and unauthorized access to Java enum properties, affecting versions prior to 1.11.0 and 2.0.0-M2.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48734 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48734.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48734"
},
{
"cve": "CVE-2025-48924",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle WebLogic Server and Apache Commons Lang versions expose systems to denial of service risks, including an uncontrolled recursion flaw leading to StackOverflowErrors.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48924 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48924.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48924"
},
{
"cve": "CVE-2025-48976",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "Multiple vulnerabilities affecting Oracle Application Testing Suite and Apache Commons FileUpload, including DoS risks due to insufficient multipart header limits, have been identified, with CVSS scores reaching 7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48976 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48976"
},
{
"cve": "CVE-2025-48989",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "description",
"text": "Recent updates for Apache Tomcat versions 9, 10, and 11 address the \u0027MadeYouReset\u0027 DoS vulnerability in HTTP/2, along with various enhancements to components like Catalina and Coyote.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-48989 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-48989.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-48989"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Recent updates for libxml2 address multiple vulnerabilities, including heap use after free and type confusion, which could lead to denial of service or crashes, alongside an Oracle vulnerability allowing unauthorized data access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49796 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-49796.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-52999",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "description",
"text": "Oracle Communications Unified Assurance has a vulnerability allowing denial of service, while jackson-core versions prior to 2.15.0 can cause StackoverflowError with deeply nested data, now mitigated in version 2.15.0.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-52999 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-52999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-52999"
},
{
"cve": "CVE-2025-53547",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "description",
"text": "Helm v3.18.4 addresses a critical vulnerability allowing local code execution through crafted `Chart.yaml` and symlinked `Chart.lock` files during dependency updates, alongside an Oracle Communications flaw with a CVSS score of 8.6.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53547 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53547.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53547"
},
{
"cve": "CVE-2025-53643",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Operations Monitor and aiohttp could allow unauthorized access and data manipulation, with significant integrity impacts and request smuggling risks in affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53643 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53643.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53643"
},
{
"cve": "CVE-2025-53864",
"cwe": {
"id": "CWE-674",
"name": "Uncontrolled Recursion"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle GoldenGate and Connect2id Nimbus JOSE + JWT expose systems to denial of service attacks, with CVSS scores indicating significant availability impacts due to issues with deeply nested JSON objects.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-53864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-53864.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-53864"
},
{
"cve": "CVE-2025-54090",
"cwe": {
"id": "CWE-253",
"name": "Incorrect Check of Function Return Value"
},
"notes": [
{
"category": "other",
"text": "Incorrect Check of Function Return Value",
"title": "CWE-253"
},
{
"category": "description",
"text": "Recent vulnerabilities in Oracle Communications Cloud Native Core Automated Test Suite and Apache HTTP Server 2.4.64 expose systems to unauthorized data access and potential denial of service, with a CVSS score of 6.3 for the Oracle issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-54090 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-54090.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-54090"
},
{
"cve": "CVE-2025-55163",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Recent updates to Netty address critical vulnerabilities, including the \u0027MadeYouReset\u0027 DDoS attack in HTTP/2, which can lead to denial of service through resource exhaustion in various affected versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55163 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55163.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-55163"
},
{
"cve": "CVE-2025-57803",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "ImageMagick has addressed critical vulnerabilities in its BMP encoder, including a 32-bit integer overflow leading to heap corruption and potential code execution, alongside other security enhancements.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-57803 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-57803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-57803"
},
{
"cve": "CVE-2025-58057",
"cwe": {
"id": "CWE-409",
"name": "Improper Handling of Highly Compressed Data (Data Amplification)"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Highly Compressed Data (Data Amplification)",
"title": "CWE-409"
},
{
"category": "other",
"text": "CWE-1035",
"title": "CWE-1035"
},
{
"category": "other",
"text": "CWE-937",
"title": "CWE-937"
},
{
"category": "description",
"text": "Multiple vulnerabilities in decompressing decoders, including `BrotliDecoder`, and components of Oracle and HPE products can lead to denial of service through excessive buffer allocation and malformed HTTP/2 frames.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-58057 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58057.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-58057"
},
{
"cve": "CVE-2025-59375",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "description",
"text": "A memory amplification vulnerability in libexpat (CVE-2025-59375) allows excessive memory allocations from crafted XML input, affecting versions prior to 2.7.2, while a Security-in-Depth issue exists in Oracle Database Server\u0027s Perl component but is not exploitable.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59375 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59375.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2",
"CSAFPID-3",
"CSAFPID-4",
"CSAFPID-5",
"CSAFPID-6",
"CSAFPID-7",
"CSAFPID-8",
"CSAFPID-9",
"CSAFPID-10",
"CSAFPID-11",
"CSAFPID-12",
"CSAFPID-13",
"CSAFPID-14",
"CSAFPID-15",
"CSAFPID-16",
"CSAFPID-17",
"CSAFPID-18",
"CSAFPID-19",
"CSAFPID-20",
"CSAFPID-21",
"CSAFPID-22",
"CSAFPID-23",
"CSAFPID-24",
"CSAFPID-25",
"CSAFPID-26",
"CSAFPID-27",
"CSAFPID-28",
"CSAFPID-29",
"CSAFPID-30",
"CSAFPID-31",
"CSAFPID-32",
"CSAFPID-33",
"CSAFPID-34",
"CSAFPID-35",
"CSAFPID-36"
]
}
],
"title": "CVE-2025-59375"
}
]
}
ghsa-h46c-h94j-95f3
Vulnerability from github
Impact
With older versions of jackson-core, if you parse an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large.
Patches
jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. Change is in https://github.com/FasterXML/jackson-core/pull/943. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs.
Workarounds
Users should avoid parsing input files from untrusted sources.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "com.fasterxml.jackson.core:jackson-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "2.15.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-52999"
],
"database_specific": {
"cwe_ids": [
"CWE-121"
],
"github_reviewed": true,
"github_reviewed_at": "2025-06-27T15:22:22Z",
"nvd_published_at": "2025-06-25T17:15:39Z",
"severity": "HIGH"
},
"details": "### Impact\nWith older versions of jackson-core, if you parse an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large.\n\n### Patches\njackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. Change is in https://github.com/FasterXML/jackson-core/pull/943. jackson-core will throw a StreamConstraintsException if the limit is reached.\njackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs.\n\n### Workarounds\nUsers should avoid parsing input files from untrusted sources.",
"id": "GHSA-h46c-h94j-95f3",
"modified": "2025-06-27T15:22:22Z",
"published": "2025-06-27T15:22:22Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-52999"
},
{
"type": "WEB",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"type": "PACKAGE",
"url": "https://github.com/FasterXML/jackson-core"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "jackson-core can throw a StackoverflowError when processing deeply nested data"
}
CERTFR-2025-AVI-0760
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | User Entity Behavior Analytics pour IBM QRadar SIEM versions antérieures à 5.0.1 | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | Db2 | Db2 on Cloud Pak for Data versions antérieures à v5.2.1 | ||
| IBM | WebSphere | IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de sécurité APAR PH67137 et APAR PH67132 | ||
| IBM | WebSphere | Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | IBM Common Licensing pour Websphere Liberty ART versions 9.0.x antérieures à 9.0.0.2 | ||
| IBM | WebSphere | Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 à 25.0.0.8 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | Cloud Pak for Applications versions 5.1 à 5.3 pour WebSphere Application Server Liberty sans les correctifs de sécurité APAR PH67132 et APAR PH67137 | ||
| IBM | WebSphere | Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalités jsonp sans le dernier correctif de sécurité | ||
| IBM | WebSphere | WebSphere Hybrid Edition version 5.1 sans les correctifs de sécurité APAR PH67137, APAR PH67132, | ||
| IBM | Db2 | Db2 Warehouse on Cloud Pak for Data versions antérieures à v5.2.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "User Entity Behavior Analytics pour IBM QRadar SIEM versions ant\u00e9rieures \u00e0 5.0.1",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty Agent versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Enterprise Application Runtimes pour WebSphere Application Server version 1.0 sans les correctif de s\u00e9curit\u00e9 APAR PH67137 et APAR PH67132",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.0.2 et 7.0.3 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.0.2 et 7.0.3 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Common Licensing pour Websphere Liberty ART versions 9.0.x ant\u00e9rieures \u00e0 9.0.0.2",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Lifecycle Management 7.1 pour WebSphere Application Server Liberty versions 17.0.0.3 \u00e0 25.0.0.8 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cloud Pak for Applications versions 5.1 \u00e0 5.3 pour WebSphere Application Server Liberty sans les correctifs de s\u00e9curit\u00e9 APAR PH67132 et APAR PH67137",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Engineering Test Management versions 7.1 pour WebSphere Application Server 8.5 et 9.0 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server and WebSphere Application Server Liberty, avec les fonctionnalit\u00e9s jsonp sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Hybrid Edition version 5.1 sans les correctifs de s\u00e9curit\u00e9 APAR PH67137, APAR PH67132,",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Warehouse on Cloud Pak for Data versions ant\u00e9rieures \u00e0 v5.2.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2022-31129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31129"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-43642",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43642"
},
{
"name": "CVE-2025-0755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0755"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-55565",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55565"
},
{
"name": "CVE-2024-51473",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51473"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-46762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46762"
},
{
"name": "CVE-2025-32421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32421"
},
{
"name": "CVE-2016-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4055"
},
{
"name": "CVE-2024-43799",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43799"
},
{
"name": "CVE-2024-49766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49766"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-30472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30472"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2024-45813",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45813"
},
{
"name": "CVE-2022-36364",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36364"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2025-48050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48050"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-33092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33092"
},
{
"name": "CVE-2024-51479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51479"
},
{
"name": "CVE-2025-1647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1647"
},
{
"name": "CVE-2023-39417",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39417"
},
{
"name": "CVE-2023-34462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34462"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-11831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11831"
},
{
"name": "CVE-2018-7489",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7489"
},
{
"name": "CVE-2025-33143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33143"
},
{
"name": "CVE-2021-3393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3393"
},
{
"name": "CVE-2025-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2533"
},
{
"name": "CVE-2019-10202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10202"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2025-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36010"
},
{
"name": "CVE-2025-36047",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36047"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2022-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2022-3510",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3510"
},
{
"name": "CVE-2022-3509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3509"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2024-8184",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8184"
},
{
"name": "CVE-2025-48068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48068"
},
{
"name": "CVE-2024-48949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48949"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-33114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33114"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2023-22467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22467"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-48948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48948"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2019-9193",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9193"
},
{
"name": "CVE-2018-5968",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5968"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2023-39410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39410"
},
{
"name": "CVE-2024-56332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56332"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24785"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2017-7525",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7525"
},
{
"name": "CVE-2023-26133",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26133"
},
{
"name": "CVE-2024-6484",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6484"
},
{
"name": "CVE-2024-6485",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6485"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2025-26791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26791"
},
{
"name": "CVE-2024-56339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56339"
},
{
"name": "CVE-2024-49767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49767"
},
{
"name": "CVE-2022-1552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1552"
},
{
"name": "CVE-2024-49828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49828"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-29927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29927"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-43800",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43800"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2017-18214",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18214"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-36071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36071"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2017-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15095"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2019-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12086"
},
{
"name": "CVE-2024-6827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6827"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2022-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2625"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2017-17485",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17485"
},
{
"name": "CVE-2024-6762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6762"
},
{
"name": "CVE-2022-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1471"
},
{
"name": "CVE-2024-52894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52894"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2022-3171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3171"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2022-41881",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41881"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-21756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21756"
},
{
"name": "CVE-2018-1000873",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000873"
},
{
"name": "CVE-2023-32305",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32305"
},
{
"name": "CVE-2025-47287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47287"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0760",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Injection SQL (SQLi)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243927",
"url": "https://www.ibm.com/support/pages/node/7243927"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243923",
"url": "https://www.ibm.com/support/pages/node/7243923"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243924",
"url": "https://www.ibm.com/support/pages/node/7243924"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244012",
"url": "https://www.ibm.com/support/pages/node/7244012"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243659",
"url": "https://www.ibm.com/support/pages/node/7243659"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244002",
"url": "https://www.ibm.com/support/pages/node/7244002"
},
{
"published_at": "2025-08-29",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243582",
"url": "https://www.ibm.com/support/pages/node/7243582"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243928",
"url": "https://www.ibm.com/support/pages/node/7243928"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243925",
"url": "https://www.ibm.com/support/pages/node/7243925"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7244010",
"url": "https://www.ibm.com/support/pages/node/7244010"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243922",
"url": "https://www.ibm.com/support/pages/node/7243922"
},
{
"published_at": "2025-09-01",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243673",
"url": "https://www.ibm.com/support/pages/node/7243673"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243877",
"url": "https://www.ibm.com/support/pages/node/7243877"
}
]
}
CERTFR-2025-AVI-0754
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.5.4 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.5.4",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2025-09-04T00:00:00",
"last_revision_date": "2025-09-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0754",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36085"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36086"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0838
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.109 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.2.2406 antérieures à 9.2.2406.123 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2408 antérieures à 9.3.2408.119 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.1 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.2.2406 antérieures à 9.2.2406.123 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 10.0.x antérieures à 10.0.0 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.2.x antérieures à 9.2.8 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.4.x antérieures à 9.4.4 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise versions 9.3.x antérieures à 9.3.6 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2411 antérieures à 9.3.2411.108 | ||
| Splunk | Splunk Enterprise | Splunk Enterprise Cloud versions 9.3.2408 antérieures à 9.3.2408.118 | ||
| Splunk | Splunk Cloud Platform | Splunk Cloud Platform versions 9.3.2411 antérieures à 9.3.2411.111 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.109",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.119",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.1",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.2.2406 ant\u00e9rieures \u00e0 9.2.2406.123",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 10.0.x ant\u00e9rieures \u00e0 10.0.0",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.2.x ant\u00e9rieures \u00e0 9.2.8",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.4.x ant\u00e9rieures \u00e0 9.4.4",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise versions 9.3.x ant\u00e9rieures \u00e0 9.3.6",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.108",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Enterprise Cloud versions 9.3.2408 ant\u00e9rieures \u00e0 9.3.2408.118",
"product": {
"name": "Splunk Enterprise",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Cloud Platform versions 9.3.2411 ant\u00e9rieures \u00e0 9.3.2411.111",
"product": {
"name": "Splunk Cloud Platform",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44906",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44906"
},
{
"name": "CVE-2022-46175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46175"
},
{
"name": "CVE-2015-5237",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5237"
},
{
"name": "CVE-2025-20367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20367"
},
{
"name": "CVE-2024-7553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7553"
},
{
"name": "CVE-2025-20366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20366"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2022-37601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37601"
},
{
"name": "CVE-2025-20370",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20370"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-20369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20369"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1351"
},
{
"name": "CVE-2025-20371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20371"
},
{
"name": "CVE-2025-20368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20368"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
}
],
"initial_release_date": "2025-10-02T00:00:00",
"last_revision_date": "2025-10-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0838",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-02T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1006",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1006"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1005",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1005"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1002",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1002"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1004",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1004"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1007",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1007"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1003",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1003"
},
{
"published_at": "2025-10-01",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-1001",
"url": "https://advisory.splunk.com/advisories/SVD-2025-1001"
}
]
}
fkie_cve-2025-52999
Vulnerability from fkie_nvd
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "jackson-core contains core low-level incremental (\"streaming\") parser and generator abstractions used by Jackson Data Processor. In versions prior to 2.15.0, if a user parses an input file and it has deeply nested data, Jackson could end up throwing a StackoverflowError if the depth is particularly large. jackson-core 2.15.0 contains a configurable limit for how deep Jackson will traverse in an input document, defaulting to an allowable depth of 1000. jackson-core will throw a StreamConstraintsException if the limit is reached. jackson-databind also benefits from this change because it uses jackson-core to parse JSON inputs. As a workaround, users should avoid parsing input files from untrusted sources."
},
{
"lang": "es",
"value": "jackson-core contiene las abstracciones principales del analizador incremental (\"streaming\") de bajo nivel y del generador utilizadas por Jackson Data Processor. En versiones anteriores a la 2.15.0, si un usuario analiza un archivo de entrada con datos profundamente anidados, Jackson pod\u00eda generar un error de Stackoverflow si la profundidad era excesiva. jackson-core 2.15.0 incluye un l\u00edmite configurable para la profundidad que Jackson recorrer\u00e1 en un documento de entrada, con una profundidad predeterminada de 1000. jackson-core generar\u00e1 una excepci\u00f3n StreamConstraintsException si se alcanza el l\u00edmite. jackson-databind tambi\u00e9n se beneficia de este cambio, ya que utiliza jackson-core para analizar las entradas JSON. Como soluci\u00f3n alternativa, se recomienda a los usuarios evitar analizar archivos de entrada de fuentes no confiables."
}
],
"id": "CVE-2025-52999",
"lastModified": "2025-06-26T18:57:43.670",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-06-25T17:15:39.820",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/FasterXML/jackson-core/pull/943"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/FasterXML/jackson-core/security/advisories/GHSA-h46c-h94j-95f3"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-121"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.