Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-46129 (GCVE-0-2023-46129)
Vulnerability from cvelistv5 – Published: 2023-10-30 23:47 – Updated: 2025-02-27 20:38{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T20:37:39.393Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9",
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9"
},
{
"tags": [
"x_transferred"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/31/1"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-46129",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-02-26T21:50:00.673870Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-02-27T20:38:56.583Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "nkeys",
"vendor": "nats-io",
"versions": [
{
"status": "affected",
"version": "\u003e= 2.10.0, \u003c 2.10.4"
},
{
"status": "affected",
"version": "\u003e= 0.4.0, \u003c 0.4.6"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-321",
"description": "CWE-321: Use of Hard-coded Cryptographic Key",
"lang": "en",
"type": "CWE"
}
]
},
{
"descriptions": [
{
"cweId": "CWE-325",
"description": "CWE-325: Missing Cryptographic Step",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-11-29T02:06:25.377Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9"
},
{
"url": "http://www.openwall.com/lists/oss-security/2023/10/31/1"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/"
}
],
"source": {
"advisory": "GHSA-mr45-rx8q-wcm9",
"discovery": "UNKNOWN"
},
"title": "xkeys Seal encryption used fixed key for all encryption"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2023-46129",
"datePublished": "2023-10-30T23:47:36.039Z",
"dateReserved": "2023-10-16T17:51:35.573Z",
"dateUpdated": "2025-02-27T20:38:56.583Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nats:nats_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"2.10.0\", \"versionEndExcluding\": \"2.10.4\", \"matchCriteriaId\": \"BBB8F9C2-3395-4D22-BA0C-8462D6E076A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:nats:nkeys:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"0.4.0\", \"versionEndExcluding\": \"0.4.6\", \"matchCriteriaId\": \"EBAF8F73-D62A-4371-916F-0296A4B975B5\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \\nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.\"}, {\"lang\": \"es\", \"value\": \"NATS.io es una tecnolog\\u00eda de comunicaci\\u00f3n distribuida pub-sub de c\\u00f3digo abierto de alto rendimiento, creada para la nube, local, IoT y computaci\\u00f3n de borde. La librer\\u00eda de manejo de claves criptogr\\u00e1ficas, nkeys, recientemente obtuvo soporte para cifrado, no solo para firma/autenticaci\\u00f3n. Esto se utiliza en nats-server 2.10 (septiembre de 2023) y versiones posteriores para llamadas de autenticaci\\u00f3n. En las versiones 0.4.0 a 0.4.5 de nkeys, correspondientes a las versiones 2.10.0 a 2.10.3 del servidor NATS, la l\\u00f3gica de manejo de cifrado `xkeys` de la librer\\u00eda nkeys pas\\u00f3 por error una matriz por valor a una funci\\u00f3n interna, donde la funci\\u00f3n mut\\u00f3 ese b\\u00fafer. para completar la clave de cifrado que se utilizar\\u00e1. Como resultado, todo el cifrado se realiz\\u00f3 en realidad con una clave de todos ceros. Esto afecta \\u00fanicamente al cifrado, no a la firma. SOLUCI\\u00d3N: COMPLETE EL IMPACTO EN LA SEGURIDAD DE LA LLAMADA DE AUTENCI\\u00d3N DEL SERVIDOR NATS. La librer\\u00eda nkeys Go 0.4.6, correspondiente a NATS Server 2.10.4, tiene un parche para este problema. No hay workarounds conocidos disponibles. Para cualquier aplicaci\\u00f3n que maneje llamadas de autenticaci\\u00f3n en Go, si usa la librer\\u00eda nkeys, actualice la dependencia, vuelva a compilarla e implementarla al mismo tiempo.\"}]",
"id": "CVE-2023-46129",
"lastModified": "2024-11-21T08:27:56.457",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-advisories@github.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2023-10-31T00:15:09.933",
"references": "[{\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/31/1\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9\", \"source\": \"security-advisories@github.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/\", \"source\": \"security-advisories@github.com\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/31/1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-advisories@github.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-321\"}, {\"lang\": \"en\", \"value\": \"CWE-325\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-46129\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2023-10-31T00:15:09.933\",\"lastModified\":\"2024-11-21T08:27:56.457\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \\nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.\"},{\"lang\":\"es\",\"value\":\"NATS.io es una tecnolog\u00eda de comunicaci\u00f3n distribuida pub-sub de c\u00f3digo abierto de alto rendimiento, creada para la nube, local, IoT y computaci\u00f3n de borde. La librer\u00eda de manejo de claves criptogr\u00e1ficas, nkeys, recientemente obtuvo soporte para cifrado, no solo para firma/autenticaci\u00f3n. Esto se utiliza en nats-server 2.10 (septiembre de 2023) y versiones posteriores para llamadas de autenticaci\u00f3n. En las versiones 0.4.0 a 0.4.5 de nkeys, correspondientes a las versiones 2.10.0 a 2.10.3 del servidor NATS, la l\u00f3gica de manejo de cifrado `xkeys` de la librer\u00eda nkeys pas\u00f3 por error una matriz por valor a una funci\u00f3n interna, donde la funci\u00f3n mut\u00f3 ese b\u00fafer. para completar la clave de cifrado que se utilizar\u00e1. Como resultado, todo el cifrado se realiz\u00f3 en realidad con una clave de todos ceros. Esto afecta \u00fanicamente al cifrado, no a la firma. SOLUCI\u00d3N: COMPLETE EL IMPACTO EN LA SEGURIDAD DE LA LLAMADA DE AUTENCI\u00d3N DEL SERVIDOR NATS. La librer\u00eda nkeys Go 0.4.6, correspondiente a NATS Server 2.10.4, tiene un parche para este problema. No hay workarounds conocidos disponibles. Para cualquier aplicaci\u00f3n que maneje llamadas de autenticaci\u00f3n en Go, si usa la librer\u00eda nkeys, actualice la dependencia, vuelva a compilarla e implementarla al mismo tiempo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-321\"},{\"lang\":\"en\",\"value\":\"CWE-325\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nats:nats_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.10.0\",\"versionEndExcluding\":\"2.10.4\",\"matchCriteriaId\":\"BBB8F9C2-3395-4D22-BA0C-8462D6E076A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:nats:nkeys:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"0.4.0\",\"versionEndExcluding\":\"0.4.6\",\"matchCriteriaId\":\"EBAF8F73-D62A-4371-916F-0296A4B975B5\"}]}]}],\"references\":[{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/31/1\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/\",\"source\":\"security-advisories@github.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2023/10/31/1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"title\": \"xkeys Seal encryption used fixed key for all encryption\", \"problemTypes\": [{\"descriptions\": [{\"cweId\": \"CWE-321\", \"lang\": \"en\", \"description\": \"CWE-321: Use of Hard-coded Cryptographic Key\", \"type\": \"CWE\"}]}, {\"descriptions\": [{\"cweId\": \"CWE-325\", \"lang\": \"en\", \"description\": \"CWE-325: Missing Cryptographic Step\", \"type\": \"CWE\"}]}], \"metrics\": [{\"cvssV3_1\": {\"attackComplexity\": \"LOW\", \"attackVector\": \"NETWORK\", \"availabilityImpact\": \"NONE\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"scope\": \"UNCHANGED\", \"userInteraction\": \"NONE\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N\", \"version\": \"3.1\"}}], \"references\": [{\"name\": \"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9\", \"tags\": [\"x_refsource_CONFIRM\"], \"url\": \"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/31/1\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/\"}], \"affected\": [{\"vendor\": \"nats-io\", \"product\": \"nkeys\", \"versions\": [{\"version\": \"\u003e= 2.10.0, \u003c 2.10.4\", \"status\": \"affected\"}, {\"version\": \"\u003e= 0.4.0, \u003c 0.4.6\", \"status\": \"affected\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2023-11-29T02:06:25.377Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \\nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.\"}], \"source\": {\"advisory\": \"GHSA-mr45-rx8q-wcm9\", \"discovery\": \"UNKNOWN\"}}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T20:37:39.393Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"name\": \"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"], \"url\": \"https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9\"}, {\"url\": \"http://www.openwall.com/lists/oss-security/2023/10/31/1\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-46129\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-02-26T21:50:00.673870Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-26T19:56:57.974Z\"}}]}",
"cveMetadata": "{\"cveId\": \"CVE-2023-46129\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"state\": \"PUBLISHED\", \"assignerShortName\": \"GitHub_M\", \"dateReserved\": \"2023-10-16T17:51:35.573Z\", \"datePublished\": \"2023-10-30T23:47:36.039Z\", \"dateUpdated\": \"2025-02-27T20:38:56.583Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2023-46129
Vulnerability from fkie_nvd - Published: 2023-10-31 00:15 - Updated: 2024-11-21 08:277.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
| Vendor | Product | Version | |
|---|---|---|---|
| nats | nats_server | * | |
| nats | nkeys | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:nats:nats_server:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BBB8F9C2-3395-4D22-BA0C-8462D6E076A6",
"versionEndExcluding": "2.10.4",
"versionStartIncluding": "2.10.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:nats:nkeys:*:*:*:*:*:*:*:*",
"matchCriteriaId": "EBAF8F73-D62A-4371-916F-0296A4B975B5",
"versionEndExcluding": "0.4.6",
"versionStartIncluding": "0.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep."
},
{
"lang": "es",
"value": "NATS.io es una tecnolog\u00eda de comunicaci\u00f3n distribuida pub-sub de c\u00f3digo abierto de alto rendimiento, creada para la nube, local, IoT y computaci\u00f3n de borde. La librer\u00eda de manejo de claves criptogr\u00e1ficas, nkeys, recientemente obtuvo soporte para cifrado, no solo para firma/autenticaci\u00f3n. Esto se utiliza en nats-server 2.10 (septiembre de 2023) y versiones posteriores para llamadas de autenticaci\u00f3n. En las versiones 0.4.0 a 0.4.5 de nkeys, correspondientes a las versiones 2.10.0 a 2.10.3 del servidor NATS, la l\u00f3gica de manejo de cifrado `xkeys` de la librer\u00eda nkeys pas\u00f3 por error una matriz por valor a una funci\u00f3n interna, donde la funci\u00f3n mut\u00f3 ese b\u00fafer. para completar la clave de cifrado que se utilizar\u00e1. Como resultado, todo el cifrado se realiz\u00f3 en realidad con una clave de todos ceros. Esto afecta \u00fanicamente al cifrado, no a la firma. SOLUCI\u00d3N: COMPLETE EL IMPACTO EN LA SEGURIDAD DE LA LLAMADA DE AUTENCI\u00d3N DEL SERVIDOR NATS. La librer\u00eda nkeys Go 0.4.6, correspondiente a NATS Server 2.10.4, tiene un parche para este problema. No hay workarounds conocidos disponibles. Para cualquier aplicaci\u00f3n que maneje llamadas de autenticaci\u00f3n en Go, si usa la librer\u00eda nkeys, actualice la dependencia, vuelva a compilarla e implementarla al mismo tiempo."
}
],
"id": "CVE-2023-46129",
"lastModified": "2024-11-21T08:27:56.457",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "security-advisories@github.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-31T00:15:09.933",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/31/1"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/"
},
{
"source": "security-advisories@github.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/31/1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-321"
},
{
"lang": "en",
"value": "CWE-325"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
WID-SEC-W-2023-3067
Vulnerability from csaf_certbund - Published: 2023-12-05 23:00 - Updated: 2024-11-13 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und um Sicherheitsmechanismen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-3067 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-3067.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-3067 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-3067"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7681 vom 2023-12-12",
"url": "https://access.redhat.com/errata/RHSA-2023:7681"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7682 vom 2023-12-12",
"url": "https://access.redhat.com/errata/RHSA-2023:7682"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7198 vom 2024-02-28",
"url": "https://access.redhat.com/errata/RHSA-2023:7198"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7197 vom 2024-02-28",
"url": "https://access.redhat.com/errata/RHSA-2023:7197"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2024-2446 vom 2024-02-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2446.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0833 vom 2024-02-21",
"url": "https://access.redhat.com/errata/RHSA-2024:0833"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0641 vom 2024-02-07",
"url": "https://access.redhat.com/errata/RHSA-2024:0641"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0660 vom 2024-02-07",
"url": "https://access.redhat.com/errata/RHSA-2024:0660"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0642 vom 2024-02-07",
"url": "https://access.redhat.com/errata/RHSA-2024:0642"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0204 vom 2024-01-20",
"url": "https://access.redhat.com/errata/RHSA-2024:0204"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7831 vom 2024-01-04",
"url": "https://access.redhat.com/errata/RHSA-2023:7831"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7663 vom 2023-12-06",
"url": "https://access.redhat.com/errata/RHSA-2023:7663"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:1859 vom 2024-04-16",
"url": "https://access.redhat.com/errata/RHSA-2024:1859"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2773 vom 2024-05-15",
"url": "https://access.redhat.com/errata/RHSA-2024:2773"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4118 vom 2024-06-26",
"url": "https://access.redhat.com/errata/RHSA-2024:4118"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7921 vom 2024-10-15",
"url": "https://access.redhat.com/errata/RHSA-2024:7921"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8991 vom 2024-11-13",
"url": "https://access.redhat.com/errata/RHSA-2024:8991"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenShift: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-13T23:00:00.000+00:00",
"generator": {
"date": "2024-11-14T10:22:48.459+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2023-3067",
"initial_release_date": "2023-12-05T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-12-05T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-12-12T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-03T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-21T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-02-05T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-02-07T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-02-20T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-02-27T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-04-16T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-05-15T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-06-25T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-15T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-13T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "13"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "distributed tracing 3",
"product": {
"name": "Red Hat OpenShift distributed tracing 3",
"product_id": "T031493",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:distributed_tracing_3"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.7",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.7",
"product_id": "T031849"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.7",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.7",
"product_id": "T031849-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.7"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45142",
"notes": [
{
"category": "description",
"text": "In Red Hat OpenShift besteht eine Schwachstelle aufgrund eines Speicherlecks im \"otelhttp handler\" von \"open-telemetry\". Ein Angreifer kann dies f\u00fcr einen Denial-of-Service-Angriff ausnutzen, indem er viele speziell gestaltete Anfragen sendet."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T031849",
"T031493"
]
},
"release_date": "2023-12-05T23:00:00.000+00:00",
"title": "CVE-2023-45142"
},
{
"cve": "CVE-2023-46129",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in Red Hat OpenShift, in Bezug auf die \"nkeys\"-Bibliothek. Ein Implementierungsfehler in der Verschl\u00fcsselungslogik von \"xkeys\" f\u00fchrt zu \"all-zeros\"-Verschl\u00fcsselungsschl\u00fcsseln. Ein Angreifer kann dies ausnutzen, um Sicherheitsmechanismen zu umgehen."
}
],
"product_status": {
"known_affected": [
"67646",
"398363",
"T031849",
"T031493"
]
},
"release_date": "2023-12-05T23:00:00.000+00:00",
"title": "CVE-2023-46129"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
VAR-202310-1531
Vulnerability from variot - Updated: 2024-01-03 13:35NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library's xkeys encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing.
FIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep. NATS of NATS Server and nkeys contains vulnerabilities related to the use of hard-coded encryption keys and vulnerabilities related to flaws in the encryption process.Information may be obtained
{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202310-1531",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "server",
"scope": "lt",
"trust": 1.0,
"vendor": "nats",
"version": "2.10.4"
},
{
"model": "server",
"scope": "gte",
"trust": 1.0,
"vendor": "nats",
"version": "2.10.0"
},
{
"model": "nkeys",
"scope": "lt",
"trust": 1.0,
"vendor": "nats",
"version": "0.4.6"
},
{
"model": "nkeys",
"scope": "gte",
"trust": 1.0,
"vendor": "nats",
"version": "0.4.0"
},
{
"model": "nkeys",
"scope": null,
"trust": 0.8,
"vendor": "nats",
"version": null
},
{
"model": "server",
"scope": null,
"trust": 0.8,
"vendor": "nats",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2023-015964"
},
{
"db": "NVD",
"id": "CVE-2023-46129"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nats:nkeys:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.4.6",
"versionStartIncluding": "0.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nats:nats_server:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.10.4",
"versionStartIncluding": "2.10.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2023-46129"
}
]
},
"cve": "CVE-2023-46129",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"author": "NVD",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Network",
"author": "NVD",
"availabilityImpact": "None",
"baseScore": 7.5,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2023-46129",
"impactScore": null,
"integrityImpact": "None",
"privilegesRequired": "None",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2023-46129",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "security-advisories@github.com",
"id": "CVE-2023-46129",
"trust": 1.0,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2023-015964"
},
{
"db": "NVD",
"id": "CVE-2023-46129"
},
{
"db": "NVD",
"id": "CVE-2023-46129"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep. NATS of NATS Server and nkeys contains vulnerabilities related to the use of hard-coded encryption keys and vulnerabilities related to flaws in the encryption process.Information may be obtained",
"sources": [
{
"db": "NVD",
"id": "CVE-2023-46129"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-015964"
},
{
"db": "VULMON",
"id": "CVE-2023-46129"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2023-46129",
"trust": 2.7
},
{
"db": "OPENWALL",
"id": "OSS-SECURITY/2023/10/31/1",
"trust": 1.9
},
{
"db": "JVNDB",
"id": "JVNDB-2023-015964",
"trust": 0.8
},
{
"db": "VULMON",
"id": "CVE-2023-46129",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2023-46129"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-015964"
},
{
"db": "NVD",
"id": "CVE-2023-46129"
}
]
},
"id": "VAR-202310-1531",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.22619048
},
"last_update_date": "2024-01-03T13:35:24.999000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Debian CVElist Bug Report Logs: golang-github-nats-io-nkeys: CVE-2023-46129",
"trust": 0.1,
"url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=1b947156b93d5526f9c7f90eda21d808"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2023-46129"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-321",
"trust": 1.0
},
{
"problemtype": "CWE-325",
"trust": 1.0
},
{
"problemtype": "Using hardcoded encryption keys (CWE-321) [ others ]",
"trust": 0.8
},
{
"problemtype": " Inadequate encryption processing (CWE-325) [ others ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2023-015964"
},
{
"db": "NVD",
"id": "CVE-2023-46129"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://github.com/nats-io/nkeys/security/advisories/ghsa-mr45-rx8q-wcm9"
},
{
"trust": 1.9,
"url": "http://www.openwall.com/lists/oss-security/2023/10/31/1"
},
{
"trust": 1.8,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/r3uetkpub3v5js5tlzof3smtgt5k5aps/"
},
{
"trust": 1.8,
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ulqqonmscqsh5z5owffqhcgez3nl4drj/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2023-46129"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/321.html"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/325.html"
},
{
"trust": 0.1,
"url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1055010"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2023-46129"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-015964"
},
{
"db": "NVD",
"id": "CVE-2023-46129"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2023-46129"
},
{
"db": "JVNDB",
"id": "JVNDB-2023-015964"
},
{
"db": "NVD",
"id": "CVE-2023-46129"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-10-31T00:00:00",
"db": "VULMON",
"id": "CVE-2023-46129"
},
{
"date": "2023-12-28T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2023-015964"
},
{
"date": "2023-10-31T00:15:09.933000",
"db": "NVD",
"id": "CVE-2023-46129"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2023-10-31T00:00:00",
"db": "VULMON",
"id": "CVE-2023-46129"
},
{
"date": "2023-12-28T06:13:00",
"db": "JVNDB",
"id": "JVNDB-2023-015964"
},
{
"date": "2023-11-29T03:15:42.270000",
"db": "NVD",
"id": "CVE-2023-46129"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "NATS\u00a0 of \u00a0NATS\u00a0Server\u00a0 and \u00a0nkeys\u00a0 Vulnerability related to the use of hard-coded encryption keys in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2023-015964"
}
],
"trust": 0.8
}
}
GSD-2023-46129
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-46129",
"id": "GSD-2023-46129"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-46129"
],
"details": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.",
"id": "GSD-2023-46129",
"modified": "2023-12-13T01:20:53.124887Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-46129",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "nkeys",
"version": {
"version_data": [
{
"version_affected": "=",
"version_value": "\u003e= 2.10.0, \u003c 2.10.4"
},
{
"version_affected": "=",
"version_value": "\u003e= 0.4.0, \u003c 0.4.6"
}
]
}
}
]
},
"vendor_name": "nats-io"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-321",
"lang": "eng",
"value": "CWE-321: Use of Hard-coded Cryptographic Key"
}
]
},
{
"description": [
{
"cweId": "CWE-325",
"lang": "eng",
"value": "CWE-325: Missing Cryptographic Step"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9",
"refsource": "MISC",
"url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9"
},
{
"name": "http://www.openwall.com/lists/oss-security/2023/10/31/1",
"refsource": "MISC",
"url": "http://www.openwall.com/lists/oss-security/2023/10/31/1"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/"
}
]
},
"source": {
"advisory": "GHSA-mr45-rx8q-wcm9",
"discovery": "UNKNOWN"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:nats:nkeys:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.4.6",
"versionStartIncluding": "0.4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:nats:nats_server:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.10.4",
"versionStartIncluding": "2.10.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security-advisories@github.com",
"ID": "CVE-2023-46129"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing. The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts. In nkeys versions 0.4.0 through 0.4.5, corresponding with NATS server versions 2.10.0 through 2.10.3, the nkeys library\u0027s `xkeys` encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key. This affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY. nkeys Go library 0.4.6, corresponding with NATS Server 2.10.4, has a patch for this issue. No known workarounds are available. For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-321"
},
{
"lang": "en",
"value": "CWE-325"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9"
},
{
"name": "http://www.openwall.com/lists/oss-security/2023/10/31/1",
"refsource": "MISC",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "http://www.openwall.com/lists/oss-security/2023/10/31/1"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/",
"refsource": "",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/",
"refsource": "",
"tags": [],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-11-29T03:15Z",
"publishedDate": "2023-10-31T00:15Z"
}
}
}
RHSA-2023:7663
Vulnerability from csaf_redhat - Published: 2023-12-06 05:00 - Updated: 2025-12-10 09:30Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing 3.0.0\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift distributed tracing provides these changes:\n\nSecurity Fix(es):\n\nCVE-2023-45142 opentelemetry: DoS vulnerability in otelhttp\nCVE-2023-46129 nkeys: xkeys Seal encryption used fixed key for all encryption\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in the\nReferences section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7663",
"url": "https://access.redhat.com/errata/RHSA-2023:7663"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2245180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245180"
},
{
"category": "external",
"summary": "2246986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246986"
},
{
"category": "external",
"summary": "TRACING-1805",
"url": "https://issues.redhat.com/browse/TRACING-1805"
},
{
"category": "external",
"summary": "TRACING-3217",
"url": "https://issues.redhat.com/browse/TRACING-3217"
},
{
"category": "external",
"summary": "TRACING-3379",
"url": "https://issues.redhat.com/browse/TRACING-3379"
},
{
"category": "external",
"summary": "TRACING-3510",
"url": "https://issues.redhat.com/browse/TRACING-3510"
},
{
"category": "external",
"summary": "TRACING-3523",
"url": "https://issues.redhat.com/browse/TRACING-3523"
},
{
"category": "external",
"summary": "TRACING-3555",
"url": "https://issues.redhat.com/browse/TRACING-3555"
},
{
"category": "external",
"summary": "TRACING-3568",
"url": "https://issues.redhat.com/browse/TRACING-3568"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7663.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.0.0 operator/operand containers",
"tracking": {
"current_release_date": "2025-12-10T09:30:58+00:00",
"generator": {
"date": "2025-12-10T09:30:58+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.13"
}
},
"id": "RHSA-2023:7663",
"initial_release_date": "2023-12-06T05:00:32+00:00",
"revision_history": [
{
"date": "2023-12-06T05:00:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-12-06T05:00:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-12-10T09:30:58+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.0",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"product_id": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"product_id": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"product_id": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"product_id": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"product_id": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"product_id": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"product_id": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"product_id": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"product_id": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64",
"product_id": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"product_id": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"product_id": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45142",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-10-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2245180"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak was found in the otelhttp handler of open-telemetry. This flaw allows a remote, unauthenticated attacker to exhaust the server\u0027s memory by sending many malicious requests, affecting the availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "opentelemetry: DoS vulnerability in otelhttp",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While no authentication is required, there are a significant number of non-default factors which prevent widespread exploitation of this flaw. For a service to be affected, all of the following must be true:\n* The go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp package must be in use\n* Configured a metrics pipeline which uses the otelhttp.NewHandler wrapper function\n* No filtering of unknown HTTP methods or user agents at a higher level (such as Content Delivery Network/Load Balancer/etc...)\n\nDue to the limited attack surface, Red Hat Product Security rates the impact as Moderate.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-770: Allocation of Resources Without Limits or Throttling vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings required for operations, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect excessive resource usage caused by malicious activity or system misconfigurations. In the event of exploitation, process isolation ensures workloads operate in separate environments, preventing any single process from overconsuming CPU or memory and degrading system performance.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
],
"known_not_affected": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45142"
},
{
"category": "external",
"summary": "RHBZ#2245180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45142",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45142"
},
{
"category": "external",
"summary": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr",
"url": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr"
}
],
"release_date": "2023-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-06T05:00:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7663"
},
{
"category": "workaround",
"details": "As a workaround to stop being affected otelhttp.WithFilter() can be used.\n\nFor convenience and safe usage of this library, it should by default mark with the label unknown non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.\n\nThe other possibility is to disable HTTP metrics instrumentation by passing otelhttp.WithMeterProvider option with noop.NewMeterProvider.",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "opentelemetry: DoS vulnerability in otelhttp"
},
{
"cve": "CVE-2023-46129",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2023-10-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246986"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nkeys. The nkeys library\u0027s \"xkeys\" encryption handling logic, mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was using an all-zeros key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nkeys: xkeys Seal encryption used fixed key for all encryption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64"
],
"known_not_affected": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46129"
},
{
"category": "external",
"summary": "RHBZ#2246986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246986"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46129"
},
{
"category": "external",
"summary": "https://advisories.nats.io/CVE/secnote-2023-02.txt",
"url": "https://advisories.nats.io/CVE/secnote-2023-02.txt"
},
{
"category": "external",
"summary": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9",
"url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9"
}
],
"release_date": "2023-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-06T05:00:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7663"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nkeys: xkeys Seal encryption used fixed key for all encryption"
}
]
}
RHSA-2023_7663
Vulnerability from csaf_redhat - Published: 2023-12-06 05:00 - Updated: 2024-12-17 22:29Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift distributed tracing 3.0.0\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Release of Red Hat OpenShift distributed tracing provides these changes:\n\nSecurity Fix(es):\n\nCVE-2023-45142 opentelemetry: DoS vulnerability in otelhttp\nCVE-2023-46129 nkeys: xkeys Seal encryption used fixed key for all encryption\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in the\nReferences section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:7663",
"url": "https://access.redhat.com/errata/RHSA-2023:7663"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2245180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245180"
},
{
"category": "external",
"summary": "2246986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246986"
},
{
"category": "external",
"summary": "TRACING-1805",
"url": "https://issues.redhat.com/browse/TRACING-1805"
},
{
"category": "external",
"summary": "TRACING-3217",
"url": "https://issues.redhat.com/browse/TRACING-3217"
},
{
"category": "external",
"summary": "TRACING-3379",
"url": "https://issues.redhat.com/browse/TRACING-3379"
},
{
"category": "external",
"summary": "TRACING-3510",
"url": "https://issues.redhat.com/browse/TRACING-3510"
},
{
"category": "external",
"summary": "TRACING-3523",
"url": "https://issues.redhat.com/browse/TRACING-3523"
},
{
"category": "external",
"summary": "TRACING-3555",
"url": "https://issues.redhat.com/browse/TRACING-3555"
},
{
"category": "external",
"summary": "TRACING-3568",
"url": "https://issues.redhat.com/browse/TRACING-3568"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_7663.json"
}
],
"title": "Red Hat Security Advisory: Red Hat OpenShift distributed tracing 3.0.0 operator/operand containers",
"tracking": {
"current_release_date": "2024-12-17T22:29:14+00:00",
"generator": {
"date": "2024-12-17T22:29:14+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2023:7663",
"initial_release_date": "2023-12-06T05:00:32+00:00",
"revision_history": [
{
"date": "2023-12-06T05:00:32+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-12-06T05:00:32+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-17T22:29:14+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift distributed tracing 3.0",
"product": {
"name": "Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift_distributed_tracing:3.0::el8"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift distributed tracing"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"product_id": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"product_id": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"product_id": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505?arch=amd64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"product_id": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"product_id": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"product_id": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c?arch=ppc64le\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"product_id": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"product_id": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"product_id": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e?arch=s390x\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"product": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"product_id": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-agent-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"product": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"product_id": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-all-in-one-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"product": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"product_id": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-collector-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"product": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"product_id": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-index-cleaner-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"product": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"product_id": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-es-rollover-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"product": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"product_id": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-ingester-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"product": {
"name": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"product_id": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-operator-bundle\u0026tag=1.51.0-14"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"product": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"product_id": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-rhel8-operator\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"product": {
"name": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"product_id": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/jaeger-query-rhel8\u0026tag=1.51.0-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"product": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"product_id": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-collector-rhel8\u0026tag=0.89.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"product": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"product_id": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-operator-bundle\u0026tag=0.89.0-16"
}
}
},
{
"category": "product_version",
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"product": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"product_id": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"product_identification_helper": {
"purl": "pkg:oci/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/opentelemetry-rhel8-operator\u0026tag=0.89.0-3"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64",
"product": {
"name": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64",
"product_id": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8\u0026tag=2.3.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"product": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"product_id": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-rhel8\u0026tag=0.1.2-19"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"product": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"product_id": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-gateway-opa-rhel8\u0026tag=13d8960-1"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"product": {
"name": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"product_id": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-operator-bundle\u0026tag=0.6.0-15"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"product": {
"name": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"product_id": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-rhel8-operator\u0026tag=0.6.0-2"
}
}
},
{
"category": "product_version",
"name": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"product": {
"name": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"product_id": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"product_identification_helper": {
"purl": "pkg:oci/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f?arch=arm64\u0026repository_url=registry.redhat.io/rhosdt/tempo-query-rhel8\u0026tag=0.6.0-3"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64"
},
"product_reference": "rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64"
},
"product_reference": "rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le"
},
"product_reference": "rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64"
},
"product_reference": "rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x"
},
"product_reference": "rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x"
},
"product_reference": "rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64"
},
"product_reference": "rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64"
},
"product_reference": "rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le"
},
"product_reference": "rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x"
},
"product_reference": "rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64"
},
"product_reference": "rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le"
},
"product_reference": "rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64"
},
"product_reference": "rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64"
},
"product_reference": "rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64"
},
"product_reference": "rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le"
},
"product_reference": "rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le"
},
"product_reference": "rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64 as a component of Red Hat OpenShift distributed tracing 3.0",
"product_id": "8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
},
"product_reference": "rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64",
"relates_to_product_reference": "8Base-RHOSDT-3.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-45142",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2023-10-19T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2245180"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak was found in the otelhttp handler of open-telemetry. This flaw allows a remote, unauthenticated attacker to exhaust the server\u0027s memory by sending many malicious requests, affecting the availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "opentelemetry: DoS vulnerability in otelhttp",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "While no authentication is required, there are a significant number of non-default factors which prevent widespread exploitation of this flaw. For a service to be affected, all of the following must be true:\n* The go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp package must be in use\n* Configured a metrics pipeline which uses the otelhttp.NewHandler wrapper function\n* No filtering of unknown HTTP methods or user agents at a higher level (such as Content Delivery Network/Load Balancer/etc...)\n\nDue to the limited attack surface, Red Hat Product Security rates the impact as Moderate.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
],
"known_not_affected": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-45142"
},
{
"category": "external",
"summary": "RHBZ#2245180",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2245180"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-45142",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45142"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-45142",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-45142"
},
{
"category": "external",
"summary": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr",
"url": "https://github.com/open-telemetry/opentelemetry-go-contrib/security/advisories/GHSA-rcjv-mgp8-qvmr"
}
],
"release_date": "2023-10-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-06T05:00:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7663"
},
{
"category": "workaround",
"details": "As a workaround to stop being affected otelhttp.WithFilter() can be used.\n\nFor convenience and safe usage of this library, it should by default mark with the label unknown non-standard HTTP methods and User agents to show that such requests were made but do not increase cardinality. In case someone wants to stay with the current behavior, library API should allow to enable it.\n\nThe other possibility is to disable HTTP metrics instrumentation by passing otelhttp.WithMeterProvider option with noop.NewMeterProvider.",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "opentelemetry: DoS vulnerability in otelhttp"
},
{
"cve": "CVE-2023-46129",
"cwe": {
"id": "CWE-325",
"name": "Missing Cryptographic Step"
},
"discovery_date": "2023-10-30T00:00:00+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2246986"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in nkeys. The nkeys library\u0027s \"xkeys\" encryption handling logic, mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was using an all-zeros key.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nkeys: xkeys Seal encryption used fixed key for all encryption",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64"
],
"known_not_affected": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-46129"
},
{
"category": "external",
"summary": "RHBZ#2246986",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2246986"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-46129",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46129"
},
{
"category": "external",
"summary": "https://advisories.nats.io/CVE/secnote-2023-02.txt",
"url": "https://advisories.nats.io/CVE/secnote-2023-02.txt"
},
{
"category": "external",
"summary": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9",
"url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9"
}
],
"release_date": "2023-10-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-12-06T05:00:32+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.",
"product_ids": [
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:7663"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:21d8fa0f0a030ce27c9587d647b7e3cbacd83b416ccbebaee10d1d2c9ab9f7d4_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:6051b1c3f9238bcfb496df7ff68638f8e14483ccac30d33fb0ca590b0f946473_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:e9ecc93a6226cb73a9bf7402906586e24a772269a9bff5365e5c67caa080658d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-agent-rhel8@sha256:f416a0ae5e029eee58e4c02f102e95f80e45402bd86ecd8b0746a2c700f736cf_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:0c763ffe9405b0928dd5916b71486f888ee6f37754e0d3f9feb74b25f617a2cb_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:100cb4237de731039f1689a98eadce7a4ab32610585b88bd39421e5bcbc4ff0f_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:469143ab1b29cc73db41e7c2234d4906ee5eb4e1179431a35cf5728361d3ede4_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-all-in-one-rhel8@sha256:ecbbab7413c79b4c17946a5cf5fb75be4a1ae8d3b8cb81f0e4512de14e071d8a_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:96235c48cc11499f15d22b4919823a648c73de381abb1506a5f1c40309d10b18_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:9d79b4fef8b2a58fe840a73a5b5d045373b2aa2ad4b5f986db0bff1e8ca8ac01_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:a081cf48c42de0dfcaf04d6a5f8eb24f9e638a10ee94e1146c83a95cf0aa78b4_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-collector-rhel8@sha256:f0cf2e3c77374cb318bf8b69fa6bd8c1478c967598fc2a59174e0955d220c36e_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:11a13b30564efabdb7dd6c55ed839c2bba54b220d8d5c39948df76a433fd50fb_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:bc4d0bc9f7d35c6f94df03f095c051994be2d690379e322eff7d9a570257bd5c_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:de28c8131fa2b6f7fba1b246557c13c4fc294975059c899972bb692c14d30012_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-index-cleaner-rhel8@sha256:ee207170af3cbedc86820c205a84ba07dd8b3a85a365f77642e6a3a8a8bffd01_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1cc081f4533b9e2364685bd69d75f531cf2e642a725ad4bdf2ba8391e0e25f3e_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:1f32b8c6c75f703698d4e2651940eaf7aa229c98ed8acb0efb9eb268b83f1715_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:6a9f07800179639aaf394b1e2b00ec6ea2d9c698329c40c9e9e7fc805c9250d3_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-es-rollover-rhel8@sha256:c17d71124489396b026e507f126fd0e701fbeffe5fcdd3a2cdec8c391d0514ab_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:4975a52d66395af440ff4148bd93d787ab3b16787025e7e2336074aa27761120_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:977fca15a589e7d6c0575abf6224387da5edb1ff3e09c2f90e6c4f2fa20227d7_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:bb9d9b51e657ccf37705a393cd8efd0d6880fbfc2bb484914652a43c39695f9b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-ingester-rhel8@sha256:f42aba536e71a6168bdfecca1cc5bdf4f41b02eb172a6efbbd63d6cf1053e033_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:110ce786fa2f997331c889d314fd136b68683a00032667bef797cab27d20e32d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:925087209f7c167f02573a1941a2abd401a99061282be964e59d24271d5ed998_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:af0f7adabe6617aa366e69a53756d0855c9f00bd973b0c1d8627845820595d30_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-operator-bundle@sha256:cea64466e14175545417779cfc72e2a7394f911d26b3abc223d8930cb37c8642_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:49b45c0ffbd25fa21989966120c9ea162a90f181e01c2138cdc4fb294d180bd8_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:6a898bfa2a63260f9bcd16929d533f14e706bd2383a46f740e789d1d097c0bed_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:78e660916be15db85341c6b37660193d603320acc1b43073083befd4eb386b1d_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/jaeger-query-rhel8@sha256:df0b1ae25db7de9281aea724f4358aabd3fab116584545edadedc1324282285c_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:2789597df07b8dd04c3e95938a94d9b0f40e7c048e3fb58e3c4b84eea7e564a7_s390x",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:3a17fb9b12912384623c73f91813d1b615ce264f28105eafd00c03922cdcf15b_amd64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:80270108087a60d63e530ce0adfea1786135e50c5c7d4e4bdba6136a3065608a_arm64",
"8Base-RHOSDT-3.0:rhosdt/jaeger-rhel8-operator@sha256:e5ec90c39ffb1a622f5def1012041507a082b04c6ec05fc55597329cce74c844_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:7c8e08a1a466603304a4543bfb03b86edfb4db8d1633e4a5c51ed706f94f95c6_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:919ce669fd6238e3b6ffb91b2913bd9fd6b67e9d7e88ab968ea533d61289cd16_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:b3aa8974f76f845b1eaa8c936b39e03bb66e6cdbc143f207958297a819c84d5b_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-collector-rhel8@sha256:fcdb0bd7733c69cf10fc32874dbeb0bb3ff9bd79415ed4bc1416c8e3f2ebc315_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:122c8f6101ea0288ec045d15e1d19a2d1d61aae3d04c9422128a2f7429e51ff5_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:299ec7215b4f3da785ade49ea8425be2af81689ffc803c3aab248229a5dd2f5a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:96f07636b69ff639d3a1f17ffe8b9bde8ed2cc1307b86fa016cd5d716a3c97e2_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-operator-bundle@sha256:b5d5510474675de5f836b205bf7e2d9c3c7d5b58a4499cff074bcd6142bcea6c_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:1e863a5424685d0c5a328a49735c6585b2506693f5620ea1616dd5d43e4e2381_s390x",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:3c96566d177d6cff012533b3813bb7c9f03dbc110c52746f32c46bba5fc99d51_amd64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9084499abcc669a5cf2b127558f511fd7f3bd84dcbb22dd3aa63c696d377d3d3_arm64",
"8Base-RHOSDT-3.0:rhosdt/opentelemetry-rhel8-operator@sha256:9c06e6b90880e97ce6e7b15d218057a0d0440d313550484619cf2ee5329c899a_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:127b7187d170a63325c08f01936d323008e7ad91e1309dd0db886f2d3ee5e991_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:4a38500536aa79127781e6e18759a22d3d2f1c455a922c29563d9f9163f1c68e_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:57606d7836efd17347c0ceffbbc3f8b49b0c4af31cbc02fd99a3da2b14d1d396_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-opa-rhel8@sha256:d1bd74c11a6a3c999344149b3db231acc29ab9b66e6e83f5769b76ec84979d52_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:0b391aee88ed6f569737ab84082966715ac26e9bb3d9ca0517578f77fa54e4e9_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:39fdd72fa31f524455421d7296b34f300755249778e778bcf49b3b1a822faef7_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:8b82385bd6ea85049822a7c38d93f6e4418c1d36cb57802751bc13dbe974da18_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-gateway-rhel8@sha256:910096f8781fcd9048810c8c15754e77f094f567d74d60677e5beefe5b94d528_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:0ecda5259499a794a9af729a29a1691f7b029c5d287c6705477fbbd3040acc41_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:6dcb68ace16c0e82ce12e808f3ac4886ef663bd76e38eb2ce8c3a1fa65e6de68_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:913fdedf596886841dbf0a0fafbbc75330df2a03e966950a7dab5b5cd4caba13_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-operator-bundle@sha256:d3d446b9adaebd3985fb8d78176100156d9133ec2cf956d92e07c3651e60cc3d_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:0cf7bf3c7f099bd44e71244895c980f9e799ac4705d96b523ba4da0944d1b505_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:28f5c9a3ad4551bd0445b1a637151e3f112706637f0bfdc3dc4968648b8f404f_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:489afafb655f7a7746f5634b1b9a3b83b71e366ed2e145eb59a7d143f9d84f9e_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-query-rhel8@sha256:e5860305c2f4d8b276b484e3db15fe5f7444649d9d76ce9664dc286f33a8363c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:182ab00f77c2fc7bcf5e7ebdc86b49ec13cc368234dfaac36fee914daecfa538_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:5274d65e763d6ec540bebc44ac1440586c3e477d403e20a66a8cb95af4c7aedd_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:59084d728b66eda4cadf932d89a560cc1e9c6485374cf911e7065799ceec5f89_arm64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8-operator@sha256:c3a78e55a18c3cefe2b79ca6d1c0f43ec8bf24573d8575992fa3f188471ef64c_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:0baf5285f10484b25ba140b147df587eaaac146e32b2ced643fda52eb6353859_ppc64le",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:a8873e09e4806402f8ea42a5a4c10693d4d863d028e13bf1a5c66a76296e2e22_amd64",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:bc45d1ca3f6f7ef339d1270ff6c4ca392fdbb7d36f5e8b5b76458ff56254d34c_s390x",
"8Base-RHOSDT-3.0:rhosdt/tempo-rhel8@sha256:cf49ba228d39dea353c61d2780014f1c0d8e986e78ac21c9389f7f4482132f30_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nkeys: xkeys Seal encryption used fixed key for all encryption"
}
]
}
MSRC_CVE-2023-46129
Vulnerability from csaf_microsoft - Published: 2023-10-01 00:00 - Updated: 2024-06-30 07:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46129 xkeys Seal encryption used fixed key for all encryption - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-46129.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "xkeys Seal encryption used fixed key for all encryption",
"tracking": {
"current_release_date": "2024-06-30T07:00:00.000Z",
"generator": {
"date": "2025-10-20T00:44:26.421Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-46129",
"initial_release_date": "2023-10-01T00:00:00.000Z",
"revision_history": [
{
"date": "2023-11-07T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 telegraf 1.27.4-1",
"product": {
"name": "\u003ccbl2 telegraf 1.27.4-1",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 telegraf 1.27.4-1",
"product": {
"name": "cbl2 telegraf 1.27.4-1",
"product_id": "18186"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 telegraf 1.29.4-1",
"product": {
"name": "\u003cazl3 telegraf 1.29.4-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "azl3 telegraf 1.29.4-1",
"product": {
"name": "azl3 telegraf 1.29.4-1",
"product_id": "18164"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 telegraf 1.27.3-4",
"product": {
"name": "\u003cazl3 telegraf 1.27.3-4",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 telegraf 1.27.3-4",
"product": {
"name": "azl3 telegraf 1.27.3-4",
"product_id": "19664"
}
}
],
"category": "product_name",
"name": "telegraf"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 telegraf 1.27.4-1 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 telegraf 1.27.4-1 as a component of CBL Mariner 2.0",
"product_id": "18186-17086"
},
"product_reference": "18186",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 telegraf 1.29.4-1 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 telegraf 1.29.4-1 as a component of Azure Linux 3.0",
"product_id": "18164-17084"
},
"product_reference": "18164",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 telegraf 1.27.3-4 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 telegraf 1.27.3-4 as a component of Azure Linux 3.0",
"product_id": "19664-17084"
},
"product_reference": "19664",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-46129",
"cwe": {
"id": "CWE-321",
"name": "Use of Hard-coded Cryptographic Key"
},
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"18186-17086",
"18164-17084",
"19664-17084"
],
"known_affected": [
"17086-2",
"17084-3",
"17084-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46129 xkeys Seal encryption used fixed key for all encryption - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-46129.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T00:00:00.000Z",
"details": "1.27.4-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2023-11-07T00:00:00.000Z",
"details": "1.29.4-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-3",
"17084-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"17086-2",
"17084-3",
"17084-1"
]
}
],
"title": "xkeys Seal encryption used fixed key for all encryption"
}
]
}
GHSA-MR45-RX8Q-WCM9
Vulnerability from github – Published: 2023-10-31 21:19 – Updated: 2023-10-31 21:19Background
NATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.
The cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts.
Problem Description
The nkeys library's "xkeys" encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key.
This affects encryption only, not signing.
FIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY.
Affected versions
nkeys Go library: * 0.4.0 up to and including 0.4.5 * Fixed with nats-io/nkeys: 0.4.6
NATS Server: * 2.10.0 up to and including 2.10.3 * Fixed with nats-io/nats-server: 2.10.4
Solution
Upgrade the nats-server.
For any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.
Credits
Problem reported by Quentin Matillat (GitHub @tinou98).
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 0.4.5"
},
"package": {
"ecosystem": "Go",
"name": "github.com/nats-io/nkeys"
},
"ranges": [
{
"events": [
{
"introduced": "0.4.0"
},
{
"fixed": "0.4.6"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 2.10.3"
},
"package": {
"ecosystem": "Go",
"name": "github.com/nats-io/nats-server/v2"
},
"ranges": [
{
"events": [
{
"introduced": "2.10.0"
},
{
"fixed": "2.10.4"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-46129"
],
"database_specific": {
"cwe_ids": [
"CWE-321",
"CWE-325"
],
"github_reviewed": true,
"github_reviewed_at": "2023-10-31T21:19:02Z",
"nvd_published_at": "2023-10-31T00:15:09Z",
"severity": "HIGH"
},
"details": "## Background\n\nNATS.io is a high performance open source pub-sub distributed communication technology, built for the cloud, on-premise, IoT, and edge computing.\n\nThe cryptographic key handling library, nkeys, recently gained support for encryption, not just for signing/authentication. This is used in nats-server 2.10 (Sep 2023) and newer for authentication callouts.\n\n## Problem Description\n\nThe nkeys library\u0027s \"xkeys\" encryption handling logic mistakenly passed an array by value into an internal function, where the function mutated that buffer to populate the encryption key to use. As a result, all encryption was actually to an all-zeros key.\n\nThis affects encryption only, not signing. \nFIXME: FILL IN IMPACT ON NATS-SERVER AUTH CALLOUT SECURITY.\n\n## Affected versions\n\nnkeys Go library:\n * 0.4.0 up to and including 0.4.5\n * Fixed with nats-io/nkeys: 0.4.6\n\nNATS Server:\n * 2.10.0 up to and including 2.10.3\n * Fixed with nats-io/nats-server: 2.10.4\n\n## Solution\n\nUpgrade the nats-server. \nFor any application handling auth callouts in Go, if using the nkeys library, update the dependency, recompile and deploy that in lockstep.\n\n## Credits\n\nProblem reported by Quentin Matillat (GitHub @tinou98).",
"id": "GHSA-mr45-rx8q-wcm9",
"modified": "2023-10-31T21:19:02Z",
"published": "2023-10-31T21:19:02Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/nats-io/nkeys/security/advisories/GHSA-mr45-rx8q-wcm9"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-46129"
},
{
"type": "WEB",
"url": "https://github.com/nats-io/nkeys/commit/58fb9d69f42ea73fffad1d14e5914dc666f3daa1"
},
{
"type": "PACKAGE",
"url": "https://github.com/nats-io/nkeys"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/R3UETKPUB3V5JS5TLZOF3SMTGT5K5APS"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ULQQONMSCQSH5Z5OWFFQHCGEZ3NL4DRJ"
},
{
"type": "WEB",
"url": "http://www.openwall.com/lists/oss-security/2023/10/31/1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"type": "CVSS_V3"
}
],
"summary": "xkeys seal encryption used fixed key for all encryption"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.