Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-53677 (GCVE-0-2024-53677)
Vulnerability from cvelistv5 – Published: 2024-12-11 15:35 – Updated: 2025-01-03 12:04- File upload logic is flawed
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Apache Software Foundation | Apache Struts |
Affected:
2.0.0 , < 6.4.0
(semver)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-53677",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-16T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-18T04:55:35.587Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-01-03T12:04:30.841Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20250103-0005/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://repo.maven.apache.org/maven2",
"defaultStatus": "unaffected",
"packageName": "org.apache.struts:struts2-core",
"product": "Apache Struts",
"vendor": "Apache Software Foundation",
"versions": [
{
"lessThan": "6.4.0",
"status": "affected",
"version": "2.0.0",
"versionType": "semver"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eFile upload logic in Apache Struts is flawed.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eAn attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 6.4.0 at least and \u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003emigrate to the new \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://struts.apache.org/core-developers/file-upload\"\u003efile upload mechanism\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e. If you are not using an old file upload logic based on\u0026nbsp;\u003cb\u003eFileuploadInterceptor\u003c/b\u003e\u0026nbsp;your application is safe.\u003c/span\u003e\u003c/p\u003eYou can find more details in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://cwiki.apache.org/confluence/display/WW/S2-067\"\u003ehttps://cwiki.apache.org/confluence/display/WW/S2-067\u003c/a\u003e"
}
],
"value": "File upload logic in Apache Struts is flawed.\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\u00a0FileuploadInterceptor\u00a0your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067"
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "YES",
"Recovery": "AUTOMATIC",
"Safety": "NEGLIGIBLE",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"baseScore": 9.5,
"baseSeverity": "CRITICAL",
"privilegesRequired": "NONE",
"providerUrgency": "RED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "LOW"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "File upload logic is flawed",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-20T15:50:38.224Z",
"orgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"shortName": "apache"
},
"references": [
{
"tags": [
"vendor-advisory"
],
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
}
],
"source": {
"advisory": "S2-067",
"discovery": "EXTERNAL"
},
"title": "Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "f0158376-9dc2-43b6-827c-5f631a4d8d09",
"assignerShortName": "apache",
"cveId": "CVE-2024-53677",
"datePublished": "2024-12-11T15:35:43.389Z",
"dateReserved": "2024-11-21T17:02:02.847Z",
"dateUpdated": "2025-01-03T12:04:30.841Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"File upload logic in Apache Struts is flawed.\\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\\n\\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\\n\\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\\u00a0FileuploadInterceptor\\u00a0your application is safe.\\n\\nYou can find more details in\\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067\"}, {\"lang\": \"es\", \"value\": \"La l\\u00f3gica de carga de archivos es una vulnerabilidad defectuosa en Apache Struts. Este problema afecta a Apache Struts: desde la versi\\u00f3n 2.0.0 hasta la 6.4.0. Se recomienda a los usuarios que actualicen a la versi\\u00f3n 6.4.0, que soluciona el problema. Puede encontrar m\\u00e1s detalles en https://cwiki.apache.org/confluence/display/WW/S2-067\"}]",
"id": "CVE-2024-53677",
"lastModified": "2025-01-03T12:15:26.673",
"metrics": "{\"cvssMetricV40\": [{\"source\": \"security@apache.org\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"4.0\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:C/RE:L/U:Red\", \"baseScore\": 9.5, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"vulnerableSystemConfidentiality\": \"HIGH\", \"vulnerableSystemIntegrity\": \"HIGH\", \"vulnerableSystemAvailability\": \"HIGH\", \"subsequentSystemConfidentiality\": \"HIGH\", \"subsequentSystemIntegrity\": \"HIGH\", \"subsequentSystemAvailability\": \"HIGH\", \"exploitMaturity\": \"NOT_DEFINED\", \"confidentialityRequirements\": \"NOT_DEFINED\", \"integrityRequirements\": \"NOT_DEFINED\", \"availabilityRequirements\": \"NOT_DEFINED\", \"modifiedAttackVector\": \"NOT_DEFINED\", \"modifiedAttackComplexity\": \"NOT_DEFINED\", \"modifiedAttackRequirements\": \"NOT_DEFINED\", \"modifiedPrivilegesRequired\": \"NOT_DEFINED\", \"modifiedUserInteraction\": \"NOT_DEFINED\", \"modifiedVulnerableSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedVulnerableSystemIntegrity\": \"NOT_DEFINED\", \"modifiedVulnerableSystemAvailability\": \"NOT_DEFINED\", \"modifiedSubsequentSystemConfidentiality\": \"NOT_DEFINED\", \"modifiedSubsequentSystemIntegrity\": \"NOT_DEFINED\", \"modifiedSubsequentSystemAvailability\": \"NOT_DEFINED\", \"safety\": \"NEGLIGIBLE\", \"automatable\": \"YES\", \"recovery\": \"AUTOMATIC\", \"valueDensity\": \"CONCENTRATED\", \"vulnerabilityResponseEffort\": \"LOW\", \"providerUrgency\": \"RED\"}}]}",
"published": "2024-12-11T16:15:14.593",
"references": "[{\"url\": \"https://cwiki.apache.org/confluence/display/WW/S2-067\", \"source\": \"security@apache.org\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20250103-0005/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Awaiting Analysis",
"weaknesses": "[{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-434\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-53677\",\"sourceIdentifier\":\"security@apache.org\",\"published\":\"2024-12-11T16:15:14.593\",\"lastModified\":\"2025-07-15T16:30:19.423\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"File upload logic in Apache Struts is flawed.\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\\n\\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\\n\\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\u00a0FileuploadInterceptor\u00a0your application is safe.\\n\\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067\"},{\"lang\":\"es\",\"value\":\"La l\u00f3gica de carga de archivos es una vulnerabilidad defectuosa en Apache Struts. Este problema afecta a Apache Struts: desde la versi\u00f3n 2.0.0 hasta la 6.4.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 6.4.0, que soluciona el problema. Puede encontrar m\u00e1s detalles en https://cwiki.apache.org/confluence/display/WW/S2-067\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security@apache.org\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:C/RE:L/U:Red\",\"baseScore\":9.5,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"attackRequirements\":\"PRESENT\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"HIGH\",\"subConfidentialityImpact\":\"HIGH\",\"subIntegrityImpact\":\"HIGH\",\"subAvailabilityImpact\":\"HIGH\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NEGLIGIBLE\",\"Automatable\":\"YES\",\"Recovery\":\"AUTOMATIC\",\"valueDensity\":\"CONCENTRATED\",\"vulnerabilityResponseEffort\":\"LOW\",\"providerUrgency\":\"RED\"}}],\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-434\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"2.0.0\",\"versionEndExcluding\":\"6.4.0\",\"matchCriteriaId\":\"BAB5D8EE-6237-4CB6-B363-E1B6982E44EE\"}]}]}],\"references\":[{\"url\":\"https://cwiki.apache.org/confluence/display/WW/S2-067\",\"source\":\"security@apache.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20250103-0005/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250103-0005/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-01-03T12:04:30.841Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-53677\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-12T15:19:19.829131Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-434\", \"description\": \"CWE-434 Unrestricted Upload of File with Dangerous Type\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-12T15:19:47.605Z\"}}], \"cna\": {\"title\": \"Apache Struts: Mixing setters for uploaded files and normal fields can allow bypass file upload checks\", \"source\": {\"advisory\": \"S2-067\", \"discovery\": \"EXTERNAL\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NEGLIGIBLE\", \"version\": \"4.0\", \"Recovery\": \"AUTOMATIC\", \"baseScore\": 9.5, \"Automatable\": \"YES\", \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"valueDensity\": \"CONCENTRATED\", \"vectorString\": \"CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red\", \"providerUrgency\": \"RED\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"attackRequirements\": \"PRESENT\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"HIGH\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"HIGH\", \"vulnAvailabilityImpact\": \"HIGH\", \"subConfidentialityImpact\": \"HIGH\", \"vulnConfidentialityImpact\": \"HIGH\", \"vulnerabilityResponseEffort\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Apache Software Foundation\", \"product\": \"Apache Struts\", \"versions\": [{\"status\": \"affected\", \"version\": \"2.0.0\", \"lessThan\": \"6.4.0\", \"versionType\": \"semver\"}], \"packageName\": \"org.apache.struts:struts2-core\", \"collectionURL\": \"https://repo.maven.apache.org/maven2\", \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://cwiki.apache.org/confluence/display/WW/S2-067\", \"tags\": [\"vendor-advisory\"]}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"File upload logic in Apache Struts is flawed.\\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\\n\\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\\n\\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\\u00a0FileuploadInterceptor\\u00a0your application is safe.\\n\\nYou can find more details in\\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eFile upload logic in Apache Struts is flawed.\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eAn attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\u003c/span\u003e\u003c/p\u003e\u003cp\u003eThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\u003c/p\u003e\u003cp\u003eUsers are recommended to upgrade to version 6.4.0 at least and \u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003emigrate to the new \u003c/span\u003e\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://struts.apache.org/core-developers/file-upload\\\"\u003efile upload mechanism\u003c/a\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e. If you are not using an old file upload logic based on\u0026nbsp;\u003cb\u003eFileuploadInterceptor\u003c/b\u003e\u0026nbsp;your application is safe.\u003c/span\u003e\u003c/p\u003eYou can find more details in\u0026nbsp;\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://cwiki.apache.org/confluence/display/WW/S2-067\\\"\u003ehttps://cwiki.apache.org/confluence/display/WW/S2-067\u003c/a\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"File upload logic is flawed\"}]}], \"providerMetadata\": {\"orgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"shortName\": \"apache\", \"dateUpdated\": \"2024-12-20T15:50:38.224Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-53677\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-03T12:04:30.841Z\", \"dateReserved\": \"2024-11-21T17:02:02.847Z\", \"assignerOrgId\": \"f0158376-9dc2-43b6-827c-5f631a4d8d09\", \"datePublished\": \"2024-12-11T15:35:43.389Z\", \"assignerShortName\": \"apache\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2024-AVI-1066
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Apache Struts. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Struts versions ant\u00e9rieures \u00e0 6.4.0",
"product": {
"name": "Struts",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1066",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Apache Struts. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Apache Struts",
"vendor_advisories": [
{
"published_at": "2024-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 Apache Struts s2-067",
"url": "https://cwiki.apache.org/confluence/display/WW/s2-067"
}
]
}
CERTFR-2025-AVI-0106
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.x antérieures à 12.0.4 IF2 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.15 | ||
| IBM | Db2 | IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions 3.5 à 4.8 antérieures à v4.8.8 | ||
| IBM | Security QRadar SIEM | QRadar SIEM versions 7.5.0 antérieures à 7.5.0 UP11 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 12.x ant\u00e9rieures \u00e0 12.0.4 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.15",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions 3.5 \u00e0 4.8 ant\u00e9rieures \u00e0 v4.8.8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP11",
"product": {
"name": "Security QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-21469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21469"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2023-51714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51714"
},
{
"name": "CVE-2021-47366",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47366"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2021-21409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21409"
},
{
"name": "CVE-2024-36361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36361"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2019-9641",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9641"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49352"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2020-20703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-20703"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2022-48968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48968"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2019-9638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9638"
},
{
"name": "CVE-2022-49016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49016"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2019-9639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9639"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2019-20444",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20444"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-50130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50130"
},
{
"name": "CVE-2024-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4317"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-31141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31141"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-45769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45769"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2018-20506",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20506"
},
{
"name": "CVE-2018-20346",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20346"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2021-37137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37137"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2022-49003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49003"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2019-9020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9020"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2021-37136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37136"
},
{
"name": "CVE-2019-9023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9023"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-41942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41942"
},
{
"name": "CVE-2021-21295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
},
{
"name": "CVE-2024-45770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45770"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2021-43797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-29736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29736"
},
{
"name": "CVE-2019-9021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9021"
},
{
"name": "CVE-2024-27268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27268"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2019-20478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20478"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-29180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29180"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2019-16869",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16869"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2018-20505",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20505"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2019-20445",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20445"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0106",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182424",
"url": "https://www.ibm.com/support/pages/node/7182424"
},
{
"published_at": "2025-02-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182335",
"url": "https://www.ibm.com/support/pages/node/7182335"
},
{
"published_at": "2025-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181898",
"url": "https://www.ibm.com/support/pages/node/7181898"
},
{
"published_at": "2025-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181480",
"url": "https://www.ibm.com/support/pages/node/7181480"
},
{
"published_at": "2025-02-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182696",
"url": "https://www.ibm.com/support/pages/node/7182696"
}
]
}
CERTFR-2025-AVI-0564
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SAP | NetWeaver | NetWeaver et ABAP Platform (SDCCN) versions ST-PI 2008_1_700, 2008_1_710 et 740 | ||
| SAP | NetWeaver | NetWeaver Application Server ABAP and ABAP Platform versionsAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757 et SAP_BASIS 758 | ||
| SAP | Business Objects Business Intelligence Platform | BusinessObjects Business Intelligence Platform (Web Intelligence) versions ENTERPRISE 430, 2025, 2027, ENTERPRISECLIENTTOOLS 430, 2025 et 2027 | ||
| SAP | NetWeaver | NetWeaver Application Server Java version ENGINEAPI 7.50 | ||
| SAP | NetWeaver | NetWeaver Application Server for ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 | ||
| SAP | Business Warehouse | Business Warehouse and SAP BW/4HANA BEx Tools version DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701 | ||
| SAP | NetWeaver | NetWeaver Enterprise Portal Administration version EP-RUNTIME 7.50 | ||
| SAP | Business Objects Business Intelligence Platform | Business Objects Business Intelligence Platform (CMC) versions ENTERPRISE 430 et 2025 | ||
| SAP | NetWeaver | NetWeaver Enterprise Portal Federated Portal Network version EP-RUNTIME 7.50 | ||
| SAP | NetWeaver | NetWeaver (RFC enabled function module) versions SAP_BW 700, 701, 702, 710, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816, 914 et 916 | ||
| SAP | NetWeaver | NetWeaver Application Server ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 | ||
| SAP | S/4HANA (Private Cloud) | S/4HANA and SAP SCM (Characteristic Propagation) versions SCMAPO 713, 714, S4CORE 102, 103, 104, S4COREOP 105, 106, 107, 108, SCM 700, 701, 702 et 712 | ||
| SAP | N/A | SAPCAR versions SAP_CAR 7.53 et 7.22EXT | ||
| SAP | S/4HANA (Private Cloud) | S/4HANA (Enterprise Event Enablement) versions SAP_GWFND 757 et 758 | ||
| SAP | NetWeaver | NetWeaver ABAP Server and ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 914 et SAP_BASIS 915 | ||
| SAP | NetWeaver | NetWeaver et ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753 et SAP_BASIS 754 | ||
| SAP | NetWeaver | NetWeaver Application Server for Java (Log Viewer) version LMNWABASICAPPS 7.50 | ||
| SAP | NetWeaver | NetWeaver (XML Data Archiving Service) version J2EE-APPS 7.50 | ||
| SAP | Business Objects Business Intelligence Platform | BusinessObjects Content Administrator workbench versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701 | ||
| SAP | N/A | Gateway Client versions SAP_GWFND 752, 753, 754, 755, 756, 757 et 758 | ||
| SAP | N/A | Data Services (DQ Report) versions SBOP_DS_MANAGEMENT_CONSOLE 4.3 et 2025 | ||
| SAP | NetWeaver | NetWeaver Visual Composer version VCBASE 7.50 | ||
| SAP | NetWeaver | NetWeaver Business Warehouse (CCAW application) versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701 | ||
| SAP | N/A | Supplier Relationship Management (Live Auction Cockpit) version SRM_SERVER 7.14 | ||
| SAP | Business Warehouse | Business Warehouse (Business Explorer Web 3.5 loading animation) versions DW4CORE 100, 200, 300, 400, 916, SAP_BW 730, 731, 740, 750, 751, 752, 753, 754, 756, 757 et 758 | ||
| SAP | NetWeaver | NetWeaver Application Server for ABAP versions SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 | ||
| SAP | Business Objects Business Intelligence Platform | BusinessObjects BI Platform Central Management Console Promotion Management Application versions ENTERPRISE 430, 2025 et 2027 | ||
| SAP | Business Warehouse | Business Warehouse et SAP Plug-In Basis versions PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758 et 816 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NetWeaver et ABAP Platform (SDCCN) versions ST-PI 2008_1_700, 2008_1_710 et 740",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server ABAP and ABAP Platform versionsAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757 et SAP_BASIS 758",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "BusinessObjects Business Intelligence Platform (Web Intelligence) versions ENTERPRISE 430, 2025, 2027, ENTERPRISECLIENTTOOLS 430, 2025 et 2027",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server Java version ENGINEAPI 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server for ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Warehouse and SAP BW/4HANA BEx Tools version DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701",
"product": {
"name": "Business Warehouse",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Enterprise Portal Administration version EP-RUNTIME 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Objects Business Intelligence Platform (CMC) versions ENTERPRISE 430 et 2025",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Enterprise Portal Federated Portal Network version EP-RUNTIME 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver (RFC enabled function module) versions SAP_BW 700, 701, 702, 710, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816, 914 et 916",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "S/4HANA and SAP SCM (Characteristic Propagation) versions SCMAPO 713, 714, S4CORE 102, 103, 104, S4COREOP 105, 106, 107, 108, SCM 700, 701, 702 et 712",
"product": {
"name": "S/4HANA (Private Cloud)",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAPCAR versions SAP_CAR 7.53 et 7.22EXT",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "S/4HANA (Enterprise Event Enablement) versions SAP_GWFND 757 et 758",
"product": {
"name": "S/4HANA (Private Cloud)",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver ABAP Server and ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 914 et SAP_BASIS 915",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver et ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753 et SAP_BASIS 754",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server for Java (Log Viewer) version LMNWABASICAPPS 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver (XML Data Archiving Service) version J2EE-APPS 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "BusinessObjects Content Administrator workbench versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Gateway Client versions SAP_GWFND 752, 753, 754, 755, 756, 757 et 758",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Data Services (DQ Report) versions SBOP_DS_MANAGEMENT_CONSOLE 4.3 et 2025",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Visual Composer version VCBASE 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Business Warehouse (CCAW application) versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Supplier Relationship Management (Live Auction Cockpit) version SRM_SERVER 7.14",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Warehouse (Business Explorer Web 3.5 loading animation) versions DW4CORE 100, 200, 300, 400, 916, SAP_BW 730, 731, 740, 750, 751, 752, 753, 754, 756, 757 et 758",
"product": {
"name": "Business Warehouse",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server for ABAP versions SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "BusinessObjects BI Platform Central Management Console Promotion Management Application versions ENTERPRISE 430, 2025 et 2027",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Warehouse et SAP Plug-In Basis versions PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758 et 816",
"product": {
"name": "Business Warehouse",
"vendor": {
"name": "SAP",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-42985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42985"
},
{
"name": "CVE-2025-42968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42968"
},
{
"name": "CVE-2025-42971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42971"
},
{
"name": "CVE-2025-42954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42954"
},
{
"name": "CVE-2025-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42970"
},
{
"name": "CVE-2025-42953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42953"
},
{
"name": "CVE-2025-31326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31326"
},
{
"name": "CVE-2025-42961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42961"
},
{
"name": "CVE-2025-42974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42974"
},
{
"name": "CVE-2025-42978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42978"
},
{
"name": "CVE-2025-30012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30012"
},
{
"name": "CVE-2025-42952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42952"
},
{
"name": "CVE-2025-42981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42981"
},
{
"name": "CVE-2025-42979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42979"
},
{
"name": "CVE-2025-42993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42993"
},
{
"name": "CVE-2025-42959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42959"
},
{
"name": "CVE-2025-42963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42963"
},
{
"name": "CVE-2025-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42969"
},
{
"name": "CVE-2025-42977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42977"
},
{
"name": "CVE-2025-42986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42986"
},
{
"name": "CVE-2025-42966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42966"
},
{
"name": "CVE-2025-30009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30009"
},
{
"name": "CVE-2025-30011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30011"
},
{
"name": "CVE-2025-42962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42962"
},
{
"name": "CVE-2025-42956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42956"
},
{
"name": "CVE-2025-43001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43001"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2025-30010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30010"
},
{
"name": "CVE-2025-42997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42997"
},
{
"name": "CVE-2025-42965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42965"
},
{
"name": "CVE-2025-30018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30018"
},
{
"name": "CVE-2025-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42967"
},
{
"name": "CVE-2025-42980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42980"
},
{
"name": "CVE-2025-42964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42964"
},
{
"name": "CVE-2025-42992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42992"
},
{
"name": "CVE-2025-42973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42973"
},
{
"name": "CVE-2025-42960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42960"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0564",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP",
"vendor_advisories": [
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 SAP july-2025",
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html"
}
]
}
CERTFR-2024-AVI-1066
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité a été découverte dans Apache Struts. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Struts versions ant\u00e9rieures \u00e0 6.4.0",
"product": {
"name": "Struts",
"vendor": {
"name": "Apache",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-1066",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 d\u00e9couverte dans Apache Struts. Elle permet \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Vuln\u00e9rabilit\u00e9 dans Apache Struts",
"vendor_advisories": [
{
"published_at": "2024-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 Apache Struts s2-067",
"url": "https://cwiki.apache.org/confluence/display/WW/s2-067"
}
]
}
CERTFR-2025-AVI-0564
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits SAP. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| SAP | NetWeaver | NetWeaver et ABAP Platform (SDCCN) versions ST-PI 2008_1_700, 2008_1_710 et 740 | ||
| SAP | NetWeaver | NetWeaver Application Server ABAP and ABAP Platform versionsAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757 et SAP_BASIS 758 | ||
| SAP | Business Objects Business Intelligence Platform | BusinessObjects Business Intelligence Platform (Web Intelligence) versions ENTERPRISE 430, 2025, 2027, ENTERPRISECLIENTTOOLS 430, 2025 et 2027 | ||
| SAP | NetWeaver | NetWeaver Application Server Java version ENGINEAPI 7.50 | ||
| SAP | NetWeaver | NetWeaver Application Server for ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 | ||
| SAP | Business Warehouse | Business Warehouse and SAP BW/4HANA BEx Tools version DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701 | ||
| SAP | NetWeaver | NetWeaver Enterprise Portal Administration version EP-RUNTIME 7.50 | ||
| SAP | Business Objects Business Intelligence Platform | Business Objects Business Intelligence Platform (CMC) versions ENTERPRISE 430 et 2025 | ||
| SAP | NetWeaver | NetWeaver Enterprise Portal Federated Portal Network version EP-RUNTIME 7.50 | ||
| SAP | NetWeaver | NetWeaver (RFC enabled function module) versions SAP_BW 700, 701, 702, 710, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816, 914 et 916 | ||
| SAP | NetWeaver | NetWeaver Application Server ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 | ||
| SAP | S/4HANA (Private Cloud) | S/4HANA and SAP SCM (Characteristic Propagation) versions SCMAPO 713, 714, S4CORE 102, 103, 104, S4COREOP 105, 106, 107, 108, SCM 700, 701, 702 et 712 | ||
| SAP | N/A | SAPCAR versions SAP_CAR 7.53 et 7.22EXT | ||
| SAP | S/4HANA (Private Cloud) | S/4HANA (Enterprise Event Enablement) versions SAP_GWFND 757 et 758 | ||
| SAP | NetWeaver | NetWeaver ABAP Server and ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 914 et SAP_BASIS 915 | ||
| SAP | NetWeaver | NetWeaver et ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753 et SAP_BASIS 754 | ||
| SAP | NetWeaver | NetWeaver Application Server for Java (Log Viewer) version LMNWABASICAPPS 7.50 | ||
| SAP | NetWeaver | NetWeaver (XML Data Archiving Service) version J2EE-APPS 7.50 | ||
| SAP | Business Objects Business Intelligence Platform | BusinessObjects Content Administrator workbench versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701 | ||
| SAP | N/A | Gateway Client versions SAP_GWFND 752, 753, 754, 755, 756, 757 et 758 | ||
| SAP | N/A | Data Services (DQ Report) versions SBOP_DS_MANAGEMENT_CONSOLE 4.3 et 2025 | ||
| SAP | NetWeaver | NetWeaver Visual Composer version VCBASE 7.50 | ||
| SAP | NetWeaver | NetWeaver Business Warehouse (CCAW application) versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701 | ||
| SAP | N/A | Supplier Relationship Management (Live Auction Cockpit) version SRM_SERVER 7.14 | ||
| SAP | Business Warehouse | Business Warehouse (Business Explorer Web 3.5 loading animation) versions DW4CORE 100, 200, 300, 400, 916, SAP_BW 730, 731, 740, 750, 751, 752, 753, 754, 756, 757 et 758 | ||
| SAP | NetWeaver | NetWeaver Application Server for ABAP versions SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816 | ||
| SAP | Business Objects Business Intelligence Platform | BusinessObjects BI Platform Central Management Console Promotion Management Application versions ENTERPRISE 430, 2025 et 2027 | ||
| SAP | Business Warehouse | Business Warehouse et SAP Plug-In Basis versions PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758 et 816 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "NetWeaver et ABAP Platform (SDCCN) versions ST-PI 2008_1_700, 2008_1_710 et 740",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server ABAP and ABAP Platform versionsAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757 et SAP_BASIS 758",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "BusinessObjects Business Intelligence Platform (Web Intelligence) versions ENTERPRISE 430, 2025, 2027, ENTERPRISECLIENTTOOLS 430, 2025 et 2027",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server Java version ENGINEAPI 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server for ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Warehouse and SAP BW/4HANA BEx Tools version DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701",
"product": {
"name": "Business Warehouse",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Enterprise Portal Administration version EP-RUNTIME 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Objects Business Intelligence Platform (CMC) versions ENTERPRISE 430 et 2025",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Enterprise Portal Federated Portal Network version EP-RUNTIME 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver (RFC enabled function module) versions SAP_BW 700, 701, 702, 710, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816, 914 et 916",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server ABAP versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "S/4HANA and SAP SCM (Characteristic Propagation) versions SCMAPO 713, 714, S4CORE 102, 103, 104, S4COREOP 105, 106, 107, 108, SCM 700, 701, 702 et 712",
"product": {
"name": "S/4HANA (Private Cloud)",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "SAPCAR versions SAP_CAR 7.53 et 7.22EXT",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "S/4HANA (Enterprise Event Enablement) versions SAP_GWFND 757 et 758",
"product": {
"name": "S/4HANA (Private Cloud)",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver ABAP Server and ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758, SAP_BASIS 914 et SAP_BASIS 915",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver et ABAP Platform versions SAP_BASIS 700, SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753 et SAP_BASIS 754",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server for Java (Log Viewer) version LMNWABASICAPPS 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver (XML Data Archiving Service) version J2EE-APPS 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "BusinessObjects Content Administrator workbench versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Gateway Client versions SAP_GWFND 752, 753, 754, 755, 756, 757 et 758",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Data Services (DQ Report) versions SBOP_DS_MANAGEMENT_CONSOLE 4.3 et 2025",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Visual Composer version VCBASE 7.50",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Business Warehouse (CCAW application) versions DW4CORE 100, 200, 300, 400, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758, 816 et SAP_BW_VIRTUAL_COMP 701",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Supplier Relationship Management (Live Auction Cockpit) version SRM_SERVER 7.14",
"product": {
"name": "N/A",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Warehouse (Business Explorer Web 3.5 loading animation) versions DW4CORE 100, 200, 300, 400, 916, SAP_BW 730, 731, 740, 750, 751, 752, 753, 754, 756, 757 et 758",
"product": {
"name": "Business Warehouse",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "NetWeaver Application Server for ABAP versions SAP_BASIS 701, SAP_BASIS 702, SAP_BASIS 731, SAP_BASIS 740, SAP_BASIS 750, SAP_BASIS 751, SAP_BASIS 752, SAP_BASIS 753, SAP_BASIS 754, SAP_BASIS 755, SAP_BASIS 756, SAP_BASIS 757, SAP_BASIS 758 et SAP_BASIS 816",
"product": {
"name": "NetWeaver",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "BusinessObjects BI Platform Central Management Console Promotion Management Application versions ENTERPRISE 430, 2025 et 2027",
"product": {
"name": "Business Objects Business Intelligence Platform",
"vendor": {
"name": "SAP",
"scada": false
}
}
},
{
"description": "Business Warehouse et SAP Plug-In Basis versions PI_BASIS 2006_1_700, 701, 702, 731, 740, SAP_BW 700, 701, 702, 731, 740, 750, 751, 752, 753, 754, 755, 756, 757, 758 et 816",
"product": {
"name": "Business Warehouse",
"vendor": {
"name": "SAP",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-42985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42985"
},
{
"name": "CVE-2025-42968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42968"
},
{
"name": "CVE-2025-42971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42971"
},
{
"name": "CVE-2025-42954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42954"
},
{
"name": "CVE-2025-42970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42970"
},
{
"name": "CVE-2025-42953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42953"
},
{
"name": "CVE-2025-31326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31326"
},
{
"name": "CVE-2025-42961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42961"
},
{
"name": "CVE-2025-42974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42974"
},
{
"name": "CVE-2025-42978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42978"
},
{
"name": "CVE-2025-30012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30012"
},
{
"name": "CVE-2025-42952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42952"
},
{
"name": "CVE-2025-42981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42981"
},
{
"name": "CVE-2025-42979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42979"
},
{
"name": "CVE-2025-42993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42993"
},
{
"name": "CVE-2025-42959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42959"
},
{
"name": "CVE-2025-42963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42963"
},
{
"name": "CVE-2025-42969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42969"
},
{
"name": "CVE-2025-42977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42977"
},
{
"name": "CVE-2025-42986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42986"
},
{
"name": "CVE-2025-42966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42966"
},
{
"name": "CVE-2025-30009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30009"
},
{
"name": "CVE-2025-30011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30011"
},
{
"name": "CVE-2025-42962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42962"
},
{
"name": "CVE-2025-42956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42956"
},
{
"name": "CVE-2025-43001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43001"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2025-30010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30010"
},
{
"name": "CVE-2025-42997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42997"
},
{
"name": "CVE-2025-42965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42965"
},
{
"name": "CVE-2025-30018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30018"
},
{
"name": "CVE-2025-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42967"
},
{
"name": "CVE-2025-42980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42980"
},
{
"name": "CVE-2025-42964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42964"
},
{
"name": "CVE-2025-42992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42992"
},
{
"name": "CVE-2025-42973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42973"
},
{
"name": "CVE-2025-42960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-42960"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0564",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits SAP. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits SAP",
"vendor_advisories": [
{
"published_at": "2025-07-08",
"title": "Bulletin de s\u00e9curit\u00e9 SAP july-2025",
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html"
}
]
}
CERTFR-2025-AVI-0401
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions 7.5.0 antérieures à 7.5.0 UP11 IF02 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Secure Analytics versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP11 IF02",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-21469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21469"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4317"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-11218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11218"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2025-1244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1244"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-45769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45769"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2024-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57807"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-45770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45770"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-29736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29736"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-56463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56463"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2024-52337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0401",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-14T00:00:00.000000"
},
{
"description": "Ajouts des identifiants CVE CVE-2017-9047, CVE-2021-37533, CVE-2023-52922, CVE-2024-11218, CVE-2024-50302, CVE-2024-53197, CVE-2024-56171, CVE-2024-57807, CVE-2024-57979, CVE-2025-0624, CVE-2025-21785, CVE-2025-24813, CVE-2025-24928, CVE-2025-27363 et CVE-2025-27516.",
"revision_date": "2025-05-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Secure Analytics",
"vendor_advisories": [
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA98556",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP11-IF03"
}
]
}
CERTFR-2025-AVI-0401
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Secure Analytics. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Juniper Secure Analytics versions 7.5.0 antérieures à 7.5.0 UP11 IF02 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Secure Analytics versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP11 IF02",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-21469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21469"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2017-9047",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9047"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-50302",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50302"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4317"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-11218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11218"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2024-53197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53197"
},
{
"name": "CVE-2025-1244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1244"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-45769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45769"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2021-37533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37533"
},
{
"name": "CVE-2024-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57807"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2024-1488",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1488"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-45770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45770"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-29736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29736"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2024-9823",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9823"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-56463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56463"
},
{
"name": "CVE-2024-53104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53104"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2025-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0624"
},
{
"name": "CVE-2024-52337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52337"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2018-12699",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12699"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0401",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-05-14T00:00:00.000000"
},
{
"description": "Ajouts des identifiants CVE CVE-2017-9047, CVE-2021-37533, CVE-2023-52922, CVE-2024-11218, CVE-2024-50302, CVE-2024-53197, CVE-2024-56171, CVE-2024-57807, CVE-2024-57979, CVE-2025-0624, CVE-2025-21785, CVE-2025-24813, CVE-2025-24928, CVE-2025-27363 et CVE-2025-27516.",
"revision_date": "2025-05-30T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks Secure Analytics. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Secure Analytics",
"vendor_advisories": [
{
"published_at": "2025-05-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA98556",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-UP11-IF03"
}
]
}
CERTFR-2025-AVI-0106
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.x antérieures à 12.0.4 IF2 | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions 3.12.x antérieures à 3.12.15 | ||
| IBM | Db2 | IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions 3.5 à 4.8 antérieures à v4.8.8 | ||
| IBM | Security QRadar SIEM | QRadar SIEM versions 7.5.0 antérieures à 7.5.0 UP11 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 12.x ant\u00e9rieures \u00e0 12.0.4 IF2",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.15",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Db2 on Cloud Pak for Data et Db2 Warehouse on Cloud Pak for Data versions 3.5 \u00e0 4.8 ant\u00e9rieures \u00e0 v4.8.8",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP11",
"product": {
"name": "Security QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-29483",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29483"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-21469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21469"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46826"
},
{
"name": "CVE-2024-42070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42070"
},
{
"name": "CVE-2023-51714",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51714"
},
{
"name": "CVE-2021-47366",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47366"
},
{
"name": "CVE-2024-41093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41093"
},
{
"name": "CVE-2021-21409",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21409"
},
{
"name": "CVE-2024-36361",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36361"
},
{
"name": "CVE-2024-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35939"
},
{
"name": "CVE-2024-41009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41009"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2019-9641",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9641"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2024-39503",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39503"
},
{
"name": "CVE-2024-50268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50268"
},
{
"name": "CVE-2024-42292",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42292"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2016-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2193"
},
{
"name": "CVE-2024-42284",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42284"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2024-26961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26961"
},
{
"name": "CVE-2024-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38608"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49352"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-22353",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22353"
},
{
"name": "CVE-2020-20703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-20703"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2022-48968",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48968"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-26976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26976"
},
{
"name": "CVE-2024-56326",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56326"
},
{
"name": "CVE-2024-50267",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50267"
},
{
"name": "CVE-2019-9638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9638"
},
{
"name": "CVE-2022-49016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49016"
},
{
"name": "CVE-2023-52492",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52492"
},
{
"name": "CVE-2023-5868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5868"
},
{
"name": "CVE-2019-9639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9639"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2024-27062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27062"
},
{
"name": "CVE-2024-35839",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35839"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-43889",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43889"
},
{
"name": "CVE-2019-20444",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20444"
},
{
"name": "CVE-2024-29415",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29415"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-45018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45018"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2024-43880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43880"
},
{
"name": "CVE-2024-26615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26615"
},
{
"name": "CVE-2024-50130",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50130"
},
{
"name": "CVE-2024-4317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4317"
},
{
"name": "CVE-2024-25026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25026"
},
{
"name": "CVE-2024-38586",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38586"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-31141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31141"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-45769",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45769"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2018-20506",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20506"
},
{
"name": "CVE-2018-20346",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20346"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-40983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40983"
},
{
"name": "CVE-2021-37137",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37137"
},
{
"name": "CVE-2023-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5869"
},
{
"name": "CVE-2022-49003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49003"
},
{
"name": "CVE-2024-42079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42079"
},
{
"name": "CVE-2024-35898",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35898"
},
{
"name": "CVE-2024-43854",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43854"
},
{
"name": "CVE-2024-44935",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44935"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2022-24823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24823"
},
{
"name": "CVE-2024-49875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49875"
},
{
"name": "CVE-2019-9020",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9020"
},
{
"name": "CVE-2024-41066",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41066"
},
{
"name": "CVE-2021-37136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37136"
},
{
"name": "CVE-2019-9023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9023"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2024-42244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42244"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-41942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41942"
},
{
"name": "CVE-2021-21295",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21295"
},
{
"name": "CVE-2024-45770",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45770"
},
{
"name": "CVE-2024-26851",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26851"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2024-50282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50282"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49949"
},
{
"name": "CVE-2021-43797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
},
{
"name": "CVE-2024-56201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56201"
},
{
"name": "CVE-2024-41092",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41092"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-29736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29736"
},
{
"name": "CVE-2019-9021",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9021"
},
{
"name": "CVE-2024-27268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27268"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2024-41042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41042"
},
{
"name": "CVE-2023-2454",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2454"
},
{
"name": "CVE-2022-42004",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42004"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2024-43892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43892"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2024-47668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47668"
},
{
"name": "CVE-2017-15010",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15010"
},
{
"name": "CVE-2023-52921",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52921"
},
{
"name": "CVE-2024-53677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53677"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-53140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53140"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2019-20478",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20478"
},
{
"name": "CVE-2024-0985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0985"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2024-40984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40984"
},
{
"name": "CVE-2023-52922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52922"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2021-21290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21290"
},
{
"name": "CVE-2024-29180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29180"
},
{
"name": "CVE-2022-42003",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42003"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2023-52917",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52917"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2024-44990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44990"
},
{
"name": "CVE-2023-42282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42282"
},
{
"name": "CVE-2024-42301",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42301"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-22354",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22354"
},
{
"name": "CVE-2024-50279",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50279"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2019-16869",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16869"
},
{
"name": "CVE-2022-23491",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23491"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2024-26924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26924"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2024-44989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44989"
},
{
"name": "CVE-2018-20505",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20505"
},
{
"name": "CVE-2024-32007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32007"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2019-20445",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20445"
},
{
"name": "CVE-2024-40961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40961"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0106",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-02-07T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182424",
"url": "https://www.ibm.com/support/pages/node/7182424"
},
{
"published_at": "2025-02-03",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182335",
"url": "https://www.ibm.com/support/pages/node/7182335"
},
{
"published_at": "2025-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181898",
"url": "https://www.ibm.com/support/pages/node/7181898"
},
{
"published_at": "2025-02-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7181480",
"url": "https://www.ibm.com/support/pages/node/7181480"
},
{
"published_at": "2025-02-05",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7182696",
"url": "https://www.ibm.com/support/pages/node/7182696"
}
]
}
WID-SEC-W-2025-0148
Vulnerability from csaf_certbund - Published: 2025-01-21 23:00 - Updated: 2025-01-21 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Oracle Communications umfasst branchenspezifische L\u00f6sungen f\u00fcr die Telekommunikationsbranche.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer oder authentisierter Angreifer kann mehrere Schwachstellen in Oracle Communications ausnutzen, um die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0148 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0148.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0148 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0148"
},
{
"category": "external",
"summary": "Oracle Critical Patch Update Advisory - January 2025 - Appendix Oracle Communications vom 2025-01-21",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html#AppendixCGBU"
}
],
"source_lang": "en-US",
"title": "Oracle Communications: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-01-21T23:00:00.000+00:00",
"generator": {
"date": "2025-01-22T09:43:54.832+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2025-0148",
"initial_release_date": "2025-01-21T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-21T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "Oracle Communications 9.0",
"product_id": "T018954",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.0"
}
}
},
{
"category": "product_version",
"name": "5.1",
"product": {
"name": "Oracle Communications 5.1",
"product_id": "T028684",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.1"
}
}
},
{
"category": "product_version",
"name": "15.0.0.0.0",
"product": {
"name": "Oracle Communications 15.0.0.0.0",
"product_id": "T032090",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:15.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "23.4.0",
"product": {
"name": "Oracle Communications 23.4.0",
"product_id": "T032091",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.0"
}
}
},
{
"category": "product_version",
"name": "24.1.0",
"product": {
"name": "Oracle Communications 24.1.0",
"product_id": "T034145",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.0"
}
}
},
{
"category": "product_version",
"name": "5.2",
"product": {
"name": "Oracle Communications 5.2",
"product_id": "T034146",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:5.2"
}
}
},
{
"category": "product_version",
"name": "23.4.4",
"product": {
"name": "Oracle Communications 23.4.4",
"product_id": "T036196",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:23.4.4"
}
}
},
{
"category": "product_version",
"name": "24.2.0",
"product": {
"name": "Oracle Communications 24.2.0",
"product_id": "T036197",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.0"
}
}
},
{
"category": "product_version",
"name": "4.1.0",
"product": {
"name": "Oracle Communications 4.1.0",
"product_id": "T036205",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.1.0"
}
}
},
{
"category": "product_version",
"name": "4.2.0",
"product": {
"name": "Oracle Communications 4.2.0",
"product_id": "T036206",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:4.2.0"
}
}
},
{
"category": "product_version",
"name": "9.2.0",
"product": {
"name": "Oracle Communications 9.2.0",
"product_id": "T036207",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.2.0"
}
}
},
{
"category": "product_version",
"name": "9.3.0",
"product": {
"name": "Oracle Communications 9.3.0",
"product_id": "T036208",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.3.0"
}
}
},
{
"category": "product_version",
"name": "24.2.1",
"product": {
"name": "Oracle Communications 24.2.1",
"product_id": "T038376",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.1"
}
}
},
{
"category": "product_version",
"name": "24.1.1",
"product": {
"name": "Oracle Communications 24.1.1",
"product_id": "T038378",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.1.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.2",
"product": {
"name": "Oracle Communications \u003c=24.2.2",
"product_id": "T038379"
}
},
{
"category": "product_version_range",
"name": "\u003c=24.2.2",
"product": {
"name": "Oracle Communications \u003c=24.2.2",
"product_id": "T038379-fixed"
}
},
{
"category": "product_version",
"name": "14",
"product": {
"name": "Oracle Communications 14.0",
"product_id": "T038382",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:14.0"
}
}
},
{
"category": "product_version",
"name": "8.2.3.0.0",
"product": {
"name": "Oracle Communications 8.2.3.0.0",
"product_id": "T040441",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:8.2.3.0.0"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.2.0.0",
"product": {
"name": "Oracle Communications \u003c=9.0.2.0.0",
"product_id": "T040442"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.0.2.0.0",
"product": {
"name": "Oracle Communications \u003c=9.0.2.0.0",
"product_id": "T040442-fixed"
}
},
{
"category": "product_version",
"name": "12.11",
"product": {
"name": "Oracle Communications 12.11",
"product_id": "T040443",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:12.11"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8",
"product_id": "T040444"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.8",
"product": {
"name": "Oracle Communications \u003c=9.1.1.8",
"product_id": "T040444-fixed"
}
},
{
"category": "product_version",
"name": "8",
"product": {
"name": "Oracle Communications 8.0",
"product_id": "T040445",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:8.0"
}
}
},
{
"category": "product_version",
"name": "8.1",
"product": {
"name": "Oracle Communications 8.1",
"product_id": "T040446",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:8.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.9",
"product": {
"name": "Oracle Communications \u003c=9.1.1.9",
"product_id": "T040447"
}
},
{
"category": "product_version_range",
"name": "\u003c=9.1.1.9",
"product": {
"name": "Oracle Communications \u003c=9.1.1.9",
"product_id": "T040447-fixed"
}
},
{
"category": "product_version",
"name": "24.3.0",
"product": {
"name": "Oracle Communications 24.3.0",
"product_id": "T040448",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.3.0"
}
}
},
{
"category": "product_version",
"name": "24.2.3",
"product": {
"name": "Oracle Communications 24.2.3",
"product_id": "T040449",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:24.2.3"
}
}
},
{
"category": "product_version",
"name": "8.6.0.4.0",
"product": {
"name": "Oracle Communications 8.6.0.4.0",
"product_id": "T040450",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:8.6.0.4.0"
}
}
},
{
"category": "product_version",
"name": "47.0.0.0.0",
"product": {
"name": "Oracle Communications 47.0.0.0.0",
"product_id": "T040451",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:47.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "9.0.0.0.0",
"product": {
"name": "Oracle Communications 9.0.0.0.0",
"product_id": "T040452",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:9.0.0.0.0"
}
}
},
{
"category": "product_version",
"name": "15",
"product": {
"name": "Oracle Communications 15.0",
"product_id": "T040453",
"product_identification_helper": {
"cpe": "cpe:/a:oracle:communications:15.0"
}
}
}
],
"category": "product_name",
"name": "Communications"
}
],
"category": "vendor",
"name": "Oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-40577",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-40577"
},
{
"cve": "CVE-2023-46218",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46604",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-46604"
},
{
"cve": "CVE-2023-50868",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2023-5678",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2024-0450",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-25638",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-28219",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-33602",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34064",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34750",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35195",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-3596",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-37371",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38475",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38807",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38807"
},
{
"cve": "CVE-2024-38819",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38827",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-41817",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-45492",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47804",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-47804"
},
{
"cve": "CVE-2024-49766",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-49766"
},
{
"cve": "CVE-2024-49767",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50602",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-53677",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2024-5535",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-56337",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2024-6119",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-7254",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7885",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-7885"
},
{
"cve": "CVE-2024-8006",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-9143",
"notes": [
{
"category": "description",
"text": "In Oracle Communications existieren mehrere Schwachstellen. Durch Ausnutzung dieser Schwachstellen kann ein entfernter, anonymer oder authentisierter Angreifer die Vertraulichkeit, Integrit\u00e4t und Verf\u00fcgbarkeit gef\u00e4hrden. F\u00fcr die Ausnutzung einiger dieser Schwachstellen ist keine Benutzerinteraktion notwendig. Oracle ver\u00f6ffentlicht keine weiteren Details zu diesen Schwachstellen (au\u00dfer der Information in der Risiko Matrix im Oracle Advisory zum Critical Patch Update, siehe Link unten in diesem Advisory). Aufgrund der knappen Informationslage erfolgt die Bewertung der Schadensh\u00f6he ausschlie\u00dflich auf Basis der CVSS Impact Matrix. Der Maximalwert f\u00fcr diese Produkte ist \"HIGH\" f\u00fcr \"Confidentiality\", \"Integrity\" und \"Availability\" \u00fcber alle Schwachstellen aggregiert und bewirkt damit eine Bewertung mit dem Wert \"HOCH\" f\u00fcr die Schadensh\u00f6he."
}
],
"product_status": {
"known_affected": [
"T036205",
"T036206",
"T036207",
"T040449",
"T036208",
"T040448",
"T034146",
"T034145",
"T038382",
"T040450",
"T040453",
"T028684",
"T040452",
"T040451",
"T036197",
"T038376",
"T038378",
"T036196",
"T018954",
"T032090",
"T032091",
"T040446",
"T040445",
"T040443",
"T040441"
],
"last_affected": [
"T038379",
"T040447",
"T040444",
"T040442"
]
},
"release_date": "2025-01-21T23:00:00.000+00:00",
"title": "CVE-2024-9143"
}
]
}
WID-SEC-W-2024-3660
Vulnerability from csaf_certbund - Published: 2024-12-10 23:00 - Updated: 2025-02-03 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "kritisch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Struts ist ein Framework f\u00fcr Java-Anwendungen auf dem Webserver Apache.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in Apache Struts ausnutzen, um beliebigen Programmcode auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-3660 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3660.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-3660 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3660"
},
{
"category": "external",
"summary": "Apache Struts Security Bulletin vom 2024-12-10",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"category": "external",
"summary": "Internet Storm Center vom 2024-12-16",
"url": "https://isc.sans.edu/diary/31520"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180801 vom 2025-01-13",
"url": "https://www.ibm.com/support/pages/node/7180801"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7182335 vom 2025-02-03",
"url": "https://www.ibm.com/support/pages/node/7182335"
}
],
"source_lang": "en-US",
"title": "Apache Struts: Schwachstelle erm\u00f6glicht Codeausf\u00fchrung",
"tracking": {
"current_release_date": "2025-02-03T23:00:00.000+00:00",
"generator": {
"date": "2025-02-04T09:15:15.733+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.10"
}
},
"id": "WID-SEC-W-2024-3660",
"initial_release_date": "2024-12-10T23:00:00.000+00:00",
"revision_history": [
{
"date": "2024-12-10T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-12-16T23:00:00.000+00:00",
"number": "2",
"summary": "Aktive Ausnutzung gemeldet"
},
{
"date": "2025-01-12T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-02-03T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.4.0",
"product": {
"name": "Apache Struts \u003c6.4.0",
"product_id": "T039777"
}
},
{
"category": "product_version",
"name": "6.4.0",
"product": {
"name": "Apache Struts 6.4.0",
"product_id": "T039777-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:apache:struts:6.4.0"
}
}
}
],
"category": "product_name",
"name": "Struts"
}
],
"category": "vendor",
"name": "Apache"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP11",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP11",
"product_id": "T040749"
}
},
{
"category": "product_version",
"name": "7.5.0 UP11",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP11",
"product_id": "T040749-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up11"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "8.1.0 \u003cFix Pack 35",
"product": {
"name": "IBM Tivoli Netcool/OMNIbus 8.1.0 \u003cFix Pack 35",
"product_id": "T040116"
}
},
{
"category": "product_version",
"name": "8.1.0 Fix Pack 35",
"product": {
"name": "IBM Tivoli Netcool/OMNIbus 8.1.0 Fix Pack 35",
"product_id": "T040116-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:tivoli_netcool%2fomnibus:8.1.0__fix_pack_35"
}
}
}
],
"category": "product_name",
"name": "Tivoli Netcool/OMNIbus"
}
],
"category": "vendor",
"name": "IBM"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53677",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Apache Struts. Eine Manipulation von Datei Upload Parametern kann zu einem Path Traversal ausgenutzt werden, was unter bestimmten Umst\u00e4nden zum Hochladen einer b\u00f6sartigen Datei f\u00fchren kann. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Code zur Ausf\u00fchrung zu bringen."
}
],
"product_status": {
"known_affected": [
"T040749",
"T039777",
"T040116"
]
},
"release_date": "2024-12-10T23:00:00.000+00:00",
"title": "CVE-2024-53677"
}
]
}
NCSC-2024-0492
Vulnerability from csaf_ncscnl - Published: 2024-12-13 10:05 - Updated: 2024-12-22 18:38Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apache heeft een kwetsbaarheid verholpen in Apache Struts (Versies van 2.0.0 tot voor 6.4.0).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheid bevindt zich in de wijze waarop de bestandupload logica is ge\u00efmplementeerd in de verouderde **FileUploadInterceptor**. Deze kwetsbaarheid kan worden misbruikt om willekeurige code op systemen die deze versies draaien uit te voeren. Aangezien de getroffen versies veelvuldig worden gebruikt in verschillende applicaties, kan de impact aanzienlijk zijn.\nApplicaties die gebruik maken van het vernieuwde **ActionFileUploadInterceptor** zijn niet gevoelig voor misbruik.\n",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apache heeft updates uitgebracht om de kwetsbaarheid te verhelpen. Naast het inzetten van de updates moeten applicaties die gebouwd zijn met Struts aangepast worden om gebruik te maken van het nieuwe **ActionFileUploadInterceptor** in plaats van het verouderde **FileUploadInterceptor**. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - certbundde; cveprojectv5; github; nvd; redhat",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"category": "external",
"summary": "Reference - github",
"url": "https://struts.apache.org/core-developers/file-upload"
}
],
"title": "Kwetsbaarheid verholpen in Apache Struts",
"tracking": {
"current_release_date": "2024-12-22T18:38:46.211336Z",
"id": "NCSC-2024-0492",
"initial_release_date": "2024-12-13T10:05:07.992077Z",
"revision_history": [
{
"date": "2024-12-13T10:05:07.992077Z",
"number": "0",
"summary": "Initiele versie"
},
{
"date": "2024-12-22T18:38:46.211336Z",
"number": "1",
"summary": "Additionele oplossing toegevoegd."
}
],
"status": "final",
"version": "1.0.1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "struts",
"product": {
"name": "struts",
"product_id": "CSAFPID-100068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "apache"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-100068"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-100068"
]
}
],
"title": "CVE-2024-53677"
}
]
}
NCSC-2025-0021
Vulnerability from csaf_ncscnl - Published: 2025-01-22 13:30 - Updated: 2025-01-22 13:30Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft meerdere kwetsbaarheden verholpen in zijn Communicatieproducten, waaronder Oracle Communications Unified Assurance, Oracle Communications Cloud Native Core Network Function en Oracle Communications Order and Service Management.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden stellen ongeauthenticeerde kwaadwillenden in staat om Denial of Service (DoS) aanvallen uit te voeren of om ongeautoriseerde toegang tot gevoelige gegevens te verkrijgen. Specifieke versies, zoals 24.2.0 en 24.3.0 van de Cloud Native Core Network Function, zijn bijzonder kwetsbaar. Kwaadwillenden kunnen deze kwetsbaarheden misbruiken door speciaal geprepareerde HTTP-verzoeken te sturen naar het kwetsbare systeem.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
},
{
"category": "general",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "general",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "general",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
},
{
"category": "general",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "general",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "general",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "general",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "general",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "general",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
},
{
"category": "general",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "general",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
},
{
"category": "general",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
},
{
"category": "general",
"text": "Expected Behavior Violation",
"title": "CWE-440"
},
{
"category": "general",
"text": "Double Free",
"title": "CWE-415"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "general",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "general",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "general",
"text": "Reachable Assertion",
"title": "CWE-617"
},
{
"category": "general",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
},
{
"category": "general",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "general",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
},
{
"category": "general",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
},
{
"category": "general",
"text": "Relative Path Traversal",
"title": "CWE-23"
},
{
"category": "general",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "general",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "general",
"text": "Observable Discrepancy",
"title": "CWE-203"
},
{
"category": "general",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
},
{
"category": "general",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "general",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
},
{
"category": "general",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "general",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "general",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Privilege Management",
"title": "CWE-269"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
},
{
"category": "general",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
},
{
"category": "general",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Communications",
"tracking": {
"current_release_date": "2025-01-22T13:30:50.189632Z",
"id": "NCSC-2025-0021",
"initial_release_date": "2025-01-22T13:30:50.189632Z",
"revision_history": [
{
"date": "2025-01-22T13:30:50.189632Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1727475",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635313",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635305",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635311",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635312",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635323",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670430",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674632",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674630",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635320",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674633",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:17.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670429",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670435",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670431",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670436",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670432",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635321",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635310",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635318",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674640",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674642",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670434",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674639",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635314",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674638",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674637",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635306",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635307",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635319",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635315",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670433",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674641",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.0.1.10.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674635",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674636",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1670437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674631",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.1.9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1674634",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635308",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications",
"product": {
"name": "communications",
"product_id": "CSAFPID-1635309",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications__10.4.0.4",
"product": {
"name": "communications__10.4.0.4",
"product_id": "CSAFPID-1674629",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications__10.4.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.2",
"product": {
"name": "communications___23.4.2",
"product_id": "CSAFPID-1670442",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.3",
"product": {
"name": "communications___23.4.3",
"product_id": "CSAFPID-1635325",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.4",
"product": {
"name": "communications___23.4.4",
"product_id": "CSAFPID-1635326",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.5",
"product": {
"name": "communications___23.4.5",
"product_id": "CSAFPID-1674645",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___23.4.6",
"product": {
"name": "communications___23.4.6",
"product_id": "CSAFPID-1674646",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___23.4.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___24.2.0",
"product": {
"name": "communications___24.2.0",
"product_id": "CSAFPID-1674644",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___24.2.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___7.2.1.0.0",
"product": {
"name": "communications___7.2.1.0.0",
"product_id": "CSAFPID-1670441",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___7.2.1.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.6",
"product": {
"name": "communications___8.6.0.6",
"product_id": "CSAFPID-1635327",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.6:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___8.6.0.8",
"product": {
"name": "communications___8.6.0.8",
"product_id": "CSAFPID-1635328",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___8.6.0.8:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.2",
"product": {
"name": "communications___9.0.2",
"product_id": "CSAFPID-1670440",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.2:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.0.3",
"product": {
"name": "communications___9.0.3",
"product_id": "CSAFPID-1635329",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications___9.1.1.8.0",
"product": {
"name": "communications___9.1.1.8.0",
"product_id": "CSAFPID-1674643",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications___9.1.1.8.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674621",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751381",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751378",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751377",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674618",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674619",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674617",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.4.3.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674623",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751380",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1751379",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications",
"product": {
"name": "communications_applications",
"product_id": "CSAFPID-1674620",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___12.0.6.0.0",
"product": {
"name": "communications_applications___12.0.6.0.0",
"product_id": "CSAFPID-1674627",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___12.0.6.0.0:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___5.5.22",
"product": {
"name": "communications_applications___5.5.22",
"product_id": "CSAFPID-1674626",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___5.5.22:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.3",
"product": {
"name": "communications_applications___6.0.3",
"product_id": "CSAFPID-1674628",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.3:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.4",
"product": {
"name": "communications_applications___6.0.4",
"product_id": "CSAFPID-1674624",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.4:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_applications___6.0.5",
"product": {
"name": "communications_applications___6.0.5",
"product_id": "CSAFPID-1674625",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_applications___6.0.5:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_asap",
"product": {
"name": "communications_asap",
"product_id": "CSAFPID-816792",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_asap:7.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-764735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751255",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-1751254",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0-15.0.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-816793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_billing_and_revenue_management",
"product": {
"name": "communications_billing_and_revenue_management",
"product_id": "CSAFPID-912557",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_billing_and_revenue_management:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-764247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1650820",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:12.0.0.4-12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-912556",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_brm_-_elastic_charging_engine",
"product": {
"name": "communications_brm_-_elastic_charging_engine",
"product_id": "CSAFPID-1751303",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_brm_-_elastic_charging_engine:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-220055",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816765",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.1.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816766",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-816767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1503577",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_automated_test_suite",
"product": {
"name": "communications_cloud_native_core_automated_test_suite",
"product_id": "CSAFPID-1751300",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_automated_test_suite:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-764237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1650752",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1673396",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_binding_support_function",
"product": {
"name": "communications_cloud_native_core_binding_support_function",
"product_id": "CSAFPID-1751079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673526",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1673394",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_certificate_management",
"product": {
"name": "communications_cloud_native_core_certificate_management",
"product_id": "CSAFPID-1751253",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_certificate_management:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816768",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-816769",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-912085",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1503578",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1673390",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_console",
"product": {
"name": "communications_cloud_native_core_console",
"product_id": "CSAFPID-1751090",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_console:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673421",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1673420",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_dbtier",
"product": {
"name": "communications_cloud_native_core_dbtier",
"product_id": "CSAFPID-1751246",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_dbtier:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816770",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-816771",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-912068",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_data_analytics_function",
"product": {
"name": "communications_cloud_native_core_network_data_analytics_function",
"product_id": "CSAFPID-1503579",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_data_analytics_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-816772",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-912076",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_exposure_function",
"product": {
"name": "communications_cloud_native_core_network_exposure_function",
"product_id": "CSAFPID-1503580",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_exposure_function:23.4.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-219838",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-611387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-816773",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912101",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1503581",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751208",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-1751209",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912539",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912540",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_install_upgrade___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912541",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_installation___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912542",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_obserability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product": {
"name": "communications_cloud_native_core_network_function_cloud_native_environment",
"product_id": "CSAFPID-912543",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_function_cloud_native_environment:_observability_services_overlay___23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816774",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.1.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816346",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912077",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1503322",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1673415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-1751231",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-816775",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_repository_function",
"product": {
"name": "communications_cloud_native_core_network_repository_function",
"product_id": "CSAFPID-912544",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_repository_function:_install_upgrade___23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816348",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-912545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816347",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-1673494",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_network_slice_selection_function",
"product": {
"name": "communications_cloud_native_core_network_slice_selection_function",
"product_id": "CSAFPID-816777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_network_slice_selection_function:_install_upgrade___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-764240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1650751",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1673395",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0-23.4.6:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-912069",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751225",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0-24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751088",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_policy",
"product": {
"name": "communications_cloud_native_core_policy",
"product_id": "CSAFPID-1751089",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_policy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-94291",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-816778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-614517",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912547",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673392",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1503582",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1673393",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751081",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-1751084",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product": {
"name": "communications_cloud_native_core_security_edge_protection_proxy",
"product_id": "CSAFPID-912546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_security_edge_protection_proxy:_automated_test_suite___23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-224795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912548",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912102",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-912549",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503583",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503584",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1503585",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1672767",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_service_communication_proxy",
"product": {
"name": "communications_cloud_native_core_service_communication_proxy",
"product_id": "CSAFPID-1751241",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_service_communication_proxy:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-764826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:22.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-90016",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912078",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816349",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-912550",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503586",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1503587",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751238",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:23.4.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751240",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.1.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1673399",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751239",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.2.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-1751082",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:24.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_cloud_native_core_unified_data_repository",
"product": {
"name": "communications_cloud_native_core_unified_data_repository",
"product_id": "CSAFPID-816779",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_cloud_native_core_unified_data_repository:_signaling___23.3.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751229",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_application_server",
"product": {
"name": "communications_converged_application_server",
"product_id": "CSAFPID-1751230",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_application_server:8.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503599",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_converged_charging_system",
"product": {
"name": "communications_converged_charging_system",
"product_id": "CSAFPID-1503600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_converged_charging_system:2.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751292",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751294",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-224793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-1751295",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergence",
"product": {
"name": "communications_convergence",
"product_id": "CSAFPID-816794",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergence:3.0.3.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-342793",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1650777",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1265",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-816350",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_convergent_charging_controller",
"product": {
"name": "communications_convergent_charging_controller",
"product_id": "CSAFPID-1261",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_convergent_charging_controller:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_core_session_manager",
"product": {
"name": "communications_core_session_manager",
"product_id": "CSAFPID-1672764",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_core_session_manager:9.1.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1503588",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751104",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.2.3.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-40293",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:8.6.0.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751237",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0-9.0.2.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751097",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-611413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-1751211",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:9.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912551",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_patches___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_diameter_signaling_router",
"product": {
"name": "communications_diameter_signaling_router",
"product_id": "CSAFPID-912552",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_diameter_signaling_router:_platform___9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503316",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1503317",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:46.6.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_eagle_element_management_system",
"product": {
"name": "communications_eagle_element_management_system",
"product_id": "CSAFPID-1751243",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_eagle_element_management_system:47.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-764242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819413",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-819414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_element_manager",
"product": {
"name": "communications_element_manager",
"product_id": "CSAFPID-816780",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_element_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-816782",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_fraud_monitor",
"product": {
"name": "communications_fraud_monitor",
"product_id": "CSAFPID-912553",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_fraud_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_instant_messaging_server",
"product": {
"name": "communications_instant_messaging_server",
"product_id": "CSAFPID-219803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-204622",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_ip_service_activator",
"product": {
"name": "communications_ip_service_activator",
"product_id": "CSAFPID-219909",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_ip_service_activator:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-816351",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.24.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_messaging_server",
"product": {
"name": "communications_messaging_server",
"product_id": "CSAFPID-1751218",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_messaging_server:8.1.0.26:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_metasolv_solution",
"product": {
"name": "communications_metasolv_solution",
"product_id": "CSAFPID-611595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_metasolv_solution:6.3.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816353",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816352",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503589",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:23.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1503590",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-1673414",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:24.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816783",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816786",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_general___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816784",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816787",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_install_upgrade___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816785",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.2.0.0.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_analytics_data_director",
"product": {
"name": "communications_network_analytics_data_director",
"product_id": "CSAFPID-816788",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_analytics_data_director:_third_party___23.3.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-342803",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1650778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.1.0.0-12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-1266",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:12.0.6.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-816354",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_charging_and_control",
"product": {
"name": "communications_network_charging_and_control",
"product_id": "CSAFPID-204563",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_charging_and_control:6.0.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_network_integrity",
"product": {
"name": "communications_network_integrity",
"product_id": "CSAFPID-219776",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_network_integrity:7.3.6.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-765242",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-916906",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:12.0.0.8:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751247",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_offline_mediation_controller",
"product": {
"name": "communications_offline_mediation_controller",
"product_id": "CSAFPID-1751248",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_offline_mediation_controller:15.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-93781",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-220132",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_operations_monitor",
"product": {
"name": "communications_operations_monitor",
"product_id": "CSAFPID-912079",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_operations_monitor:5.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-224790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-221118",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_order_and_service_management",
"product": {
"name": "communications_order_and_service_management",
"product_id": "CSAFPID-1673496",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_order_and_service_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_performance_intelligence",
"product": {
"name": "communications_performance_intelligence",
"product_id": "CSAFPID-1503591",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_performance_intelligence:10.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816789",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:12.6.1.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_policy_management",
"product": {
"name": "communications_policy_management",
"product_id": "CSAFPID-816790",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_policy_management:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-764738",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_pricing_design_center",
"product": {
"name": "communications_pricing_design_center",
"product_id": "CSAFPID-816355",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_pricing_design_center:15.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503601",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816359",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816358",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816357",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-912558",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751233",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1503602",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-1751234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:8.1.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816795",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.0.7.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816796",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.1.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_service_catalog_and_design",
"product": {
"name": "communications_service_catalog_and_design",
"product_id": "CSAFPID-816797",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_service_catalog_and_design:_psr_designer___7.4.2.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503592",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503593",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:4.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1672762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503594",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.2.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_border_controller",
"product": {
"name": "communications_session_border_controller",
"product_id": "CSAFPID-1503595",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_border_controller:9.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-342804",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819415",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-819416",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.0.2.0.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_session_report_manager",
"product": {
"name": "communications_session_report_manager",
"product_id": "CSAFPID-816791",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_session_report_manager:9.4.53:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-240600",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673382",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:5.5.0-5.5.22:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1650731",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1673530",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.0-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.1-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_assurance",
"product": {
"name": "communications_unified_assurance",
"product_id": "CSAFPID-1751296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_assurance:6.0.4-6.0.5:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-764739",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-8984",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204510",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-204569",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.4.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-219826",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_unified_inventory_management",
"product": {
"name": "communications_unified_inventory_management",
"product_id": "CSAFPID-912073",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_unified_inventory_management:7.5.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503596",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503597",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.3:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1503598",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11.4:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751217",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:12.11:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-912080",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1673481",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:14.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_user_data_repository",
"product": {
"name": "communications_user_data_repository",
"product_id": "CSAFPID-1751258",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_user_data_repository:15.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "communications_webrtc_session_controller",
"product": {
"name": "communications_webrtc_session_controller",
"product_id": "CSAFPID-912554",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:communications_webrtc_session_controller:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-41727",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-41727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-41727.json"
}
],
"title": "CVE-2022-41727"
},
{
"cve": "CVE-2023-4408",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-4408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4408.json"
}
],
"title": "CVE-2023-4408"
},
{
"cve": "CVE-2023-5678",
"cwe": {
"id": "CWE-754",
"name": "Improper Check for Unusual or Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
},
{
"category": "other",
"text": "Missing Cryptographic Step",
"title": "CWE-325"
},
{
"category": "other",
"text": "Unchecked Input for Loop Condition",
"title": "CWE-606"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5678",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5678.json"
}
],
"title": "CVE-2023-5678"
},
{
"cve": "CVE-2023-5981",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-5981",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-5981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751217",
"CSAFPID-1673481"
]
}
],
"title": "CVE-2023-5981"
},
{
"cve": "CVE-2023-6597",
"cwe": {
"id": "CWE-61",
"name": "UNIX Symbolic Link (Symlink) Following"
},
"notes": [
{
"category": "other",
"text": "UNIX Symbolic Link (Symlink) Following",
"title": "CWE-61"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-6597",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-6597.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2023-6597"
},
{
"cve": "CVE-2023-7256",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"notes": [
{
"category": "other",
"text": "Double Free",
"title": "CWE-415"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7256",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7256.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2023-7256"
},
{
"cve": "CVE-2023-29407",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29407",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29407.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2023-29407"
},
{
"cve": "CVE-2023-29408",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29408",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29408.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2023-29408"
},
{
"cve": "CVE-2023-40577",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-40577",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-40577.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2023-40577"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-912539",
"CSAFPID-816773",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912101",
"CSAFPID-912544",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-912545",
"CSAFPID-764240",
"CSAFPID-912546",
"CSAFPID-614517",
"CSAFPID-912547",
"CSAFPID-224795",
"CSAFPID-912548",
"CSAFPID-912102",
"CSAFPID-912549",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912553",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-765242",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1751211"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46604",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-46604",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-46604.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-94291",
"CSAFPID-40293",
"CSAFPID-1265",
"CSAFPID-1261",
"CSAFPID-1266",
"CSAFPID-8984",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-219826",
"CSAFPID-204510",
"CSAFPID-204563",
"CSAFPID-204569",
"CSAFPID-204622",
"CSAFPID-219803",
"CSAFPID-219838",
"CSAFPID-219909",
"CSAFPID-221118",
"CSAFPID-224790",
"CSAFPID-224793",
"CSAFPID-240600",
"CSAFPID-342793",
"CSAFPID-342803",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-611595",
"CSAFPID-614517",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764738",
"CSAFPID-816346",
"CSAFPID-816347",
"CSAFPID-816348",
"CSAFPID-816349",
"CSAFPID-816350",
"CSAFPID-816351",
"CSAFPID-816352",
"CSAFPID-816353",
"CSAFPID-816354",
"CSAFPID-816355",
"CSAFPID-816357",
"CSAFPID-816358",
"CSAFPID-816359",
"CSAFPID-816765",
"CSAFPID-816766",
"CSAFPID-816767",
"CSAFPID-816768",
"CSAFPID-816769",
"CSAFPID-816770",
"CSAFPID-816771",
"CSAFPID-816772",
"CSAFPID-816773",
"CSAFPID-816774",
"CSAFPID-816775",
"CSAFPID-816776",
"CSAFPID-816777",
"CSAFPID-816778",
"CSAFPID-816779",
"CSAFPID-816780",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-816783",
"CSAFPID-816784",
"CSAFPID-816785",
"CSAFPID-816786",
"CSAFPID-816787",
"CSAFPID-816788",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-816791",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-816794",
"CSAFPID-816795",
"CSAFPID-816796",
"CSAFPID-816797",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751104"
]
}
],
"title": "CVE-2023-46604"
},
{
"cve": "CVE-2023-50868",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2023-50868",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50868.json"
}
],
"title": "CVE-2023-50868"
},
{
"cve": "CVE-2024-0232",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650777",
"CSAFPID-1650778",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0232.json"
}
],
"title": "CVE-2024-0232"
},
{
"cve": "CVE-2024-0397",
"product_status": {
"known_affected": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0397",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0397.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-0397"
},
{
"cve": "CVE-2024-0450",
"cwe": {
"id": "CWE-450",
"name": "Multiple Interpretations of UI Input"
},
"notes": [
{
"category": "other",
"text": "Multiple Interpretations of UI Input",
"title": "CWE-450"
},
{
"category": "other",
"text": "Asymmetric Resource Consumption (Amplification)",
"title": "CWE-405"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0450",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0450.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097"
]
}
],
"title": "CVE-2024-0450"
},
{
"cve": "CVE-2024-1442",
"cwe": {
"id": "CWE-269",
"name": "Improper Privilege Management"
},
"notes": [
{
"category": "other",
"text": "Improper Privilege Management",
"title": "CWE-269"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1442",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1442.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-1442"
},
{
"cve": "CVE-2024-2961",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-2961",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-2961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1672762",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1673396",
"CSAFPID-1673395",
"CSAFPID-1673494",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751097",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-2961"
},
{
"cve": "CVE-2024-3596",
"cwe": {
"id": "CWE-924",
"name": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Enforcement of Message Integrity During Transmission in a Communication Channel",
"title": "CWE-924"
},
{
"category": "other",
"text": "Use of Weak Hash",
"title": "CWE-328"
},
{
"category": "other",
"text": "Authentication Bypass by Capture-replay",
"title": "CWE-294"
},
{
"category": "other",
"text": "Use of Password Hash Instead of Password for Authentication",
"title": "CWE-836"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
},
{
"category": "other",
"text": "User Interface (UI) Misrepresentation of Critical Information",
"title": "CWE-451"
},
{
"category": "other",
"text": "Improper Validation of Integrity Check Value",
"title": "CWE-354"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-3596",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-3596.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-912079",
"CSAFPID-220132",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-3596"
},
{
"cve": "CVE-2024-4030",
"cwe": {
"id": "CWE-276",
"name": "Incorrect Default Permissions"
},
"notes": [
{
"category": "other",
"text": "Incorrect Default Permissions",
"title": "CWE-276"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4030",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4030.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4030"
},
{
"cve": "CVE-2024-4032",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4032",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4032.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-4032"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751253"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-6119",
"cwe": {
"id": "CWE-843",
"name": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6119",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6119.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-6119"
},
{
"cve": "CVE-2024-6162",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6162",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6162.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751303",
"CSAFPID-1650820",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-6162"
},
{
"cve": "CVE-2024-6232",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-6232",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-6232.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-6232"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673391",
"CSAFPID-1673394",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751233",
"CSAFPID-1673530",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-7592",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7592",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7592.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-7592"
},
{
"cve": "CVE-2024-7885",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7885",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7885.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673526",
"CSAFPID-1673399",
"CSAFPID-1751080",
"CSAFPID-1751090",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-7885"
},
{
"cve": "CVE-2024-8006",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-8006",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-8006.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220132",
"CSAFPID-1751084",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-8006"
},
{
"cve": "CVE-2024-9143",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751253"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-9143",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-9143.json"
}
],
"title": "CVE-2024-9143"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-764237",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-342804",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-24786",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24786",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24786.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-24786"
},
{
"cve": "CVE-2024-24791",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-24791",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-24791.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-24791"
},
{
"cve": "CVE-2024-25638",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"notes": [
{
"category": "other",
"text": "Insufficient Verification of Data Authenticity",
"title": "CWE-345"
},
{
"category": "other",
"text": "Acceptance of Extraneous Untrusted Data With Trusted Data",
"title": "CWE-349"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25638",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25638.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.9,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751229",
"CSAFPID-1751230",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-25638"
},
{
"cve": "CVE-2024-25710",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-25710",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-25710.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-912068",
"CSAFPID-912076",
"CSAFPID-611387",
"CSAFPID-816773",
"CSAFPID-912101",
"CSAFPID-912077",
"CSAFPID-816348",
"CSAFPID-764240",
"CSAFPID-614517",
"CSAFPID-224795",
"CSAFPID-912102",
"CSAFPID-764826",
"CSAFPID-90016",
"CSAFPID-912078",
"CSAFPID-611413",
"CSAFPID-764242",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-93781",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-342804",
"CSAFPID-912080",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-219776",
"CSAFPID-765242",
"CSAFPID-764739",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219826",
"CSAFPID-912073",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218"
]
}
],
"title": "CVE-2024-25710"
},
{
"cve": "CVE-2024-26308",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26308",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26308.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1670429",
"CSAFPID-1670430",
"CSAFPID-1670431",
"CSAFPID-1670432",
"CSAFPID-1670433",
"CSAFPID-1670434",
"CSAFPID-1670435",
"CSAFPID-1670436",
"CSAFPID-1670437",
"CSAFPID-1670438",
"CSAFPID-1670439",
"CSAFPID-1670440",
"CSAFPID-1670441",
"CSAFPID-1670442",
"CSAFPID-90016",
"CSAFPID-93781",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-219776",
"CSAFPID-219826",
"CSAFPID-220132",
"CSAFPID-224795",
"CSAFPID-342804",
"CSAFPID-611387",
"CSAFPID-611413",
"CSAFPID-614517",
"CSAFPID-764237",
"CSAFPID-764240",
"CSAFPID-764242",
"CSAFPID-764247",
"CSAFPID-764735",
"CSAFPID-764739",
"CSAFPID-764826",
"CSAFPID-765242",
"CSAFPID-816348",
"CSAFPID-816773",
"CSAFPID-816781",
"CSAFPID-816782",
"CSAFPID-912068",
"CSAFPID-912073",
"CSAFPID-912076",
"CSAFPID-912077",
"CSAFPID-912078",
"CSAFPID-912079",
"CSAFPID-912080",
"CSAFPID-912085",
"CSAFPID-912101",
"CSAFPID-912102",
"CSAFPID-912539",
"CSAFPID-912540",
"CSAFPID-912541",
"CSAFPID-912542",
"CSAFPID-912543",
"CSAFPID-912544",
"CSAFPID-912545",
"CSAFPID-912546",
"CSAFPID-912547",
"CSAFPID-912548",
"CSAFPID-912549",
"CSAFPID-912550",
"CSAFPID-912551",
"CSAFPID-912552",
"CSAFPID-912553",
"CSAFPID-912554",
"CSAFPID-912556",
"CSAFPID-912557",
"CSAFPID-912558",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-1503582",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-1727475",
"CSAFPID-1751218",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-26308"
},
{
"cve": "CVE-2024-27309",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-27309",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-27309.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-27309"
},
{
"cve": "CVE-2024-28219",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"notes": [
{
"category": "other",
"text": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"title": "CWE-120"
},
{
"category": "other",
"text": "Use of Potentially Dangerous Function",
"title": "CWE-676"
},
{
"category": "other",
"text": "Integer Overflow to Buffer Overflow",
"title": "CWE-680"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1751085",
"CSAFPID-912547"
]
}
],
"title": "CVE-2024-28219"
},
{
"cve": "CVE-2024-28834",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Use of a Broken or Risky Cryptographic Algorithm",
"title": "CWE-327"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28834",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28834.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28834"
},
{
"cve": "CVE-2024-28835",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28835",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28835.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1751217",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-28835"
},
{
"cve": "CVE-2024-28849",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-28849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-28849.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1673414",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751235",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-28849"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-1650752",
"CSAFPID-1650751",
"CSAFPID-1673494",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1674636",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751233",
"CSAFPID-1751218",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-29133",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29133",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29133.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1650820",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673530",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-29133"
},
{
"cve": "CVE-2024-33599",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33599",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33599.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33599"
},
{
"cve": "CVE-2024-33600",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33600",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33600.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33600"
},
{
"cve": "CVE-2024-33601",
"cwe": {
"id": "CWE-703",
"name": "Improper Check or Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
},
{
"category": "other",
"text": "Reachable Assertion",
"title": "CWE-617"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33601",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33601.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33601"
},
{
"cve": "CVE-2024-33602",
"cwe": {
"id": "CWE-466",
"name": "Return of Pointer Value Outside of Expected Range"
},
"notes": [
{
"category": "other",
"text": "Return of Pointer Value Outside of Expected Range",
"title": "CWE-466"
},
{
"category": "other",
"text": "Improper Check or Handling of Exceptional Conditions",
"title": "CWE-703"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-33602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-33602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673396",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-1672762",
"CSAFPID-1673395",
"CSAFPID-1672764",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673494",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237"
]
}
],
"title": "CVE-2024-33602"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1635310",
"CSAFPID-1635311",
"CSAFPID-1635312",
"CSAFPID-1635313",
"CSAFPID-1635314",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635317",
"CSAFPID-1635318",
"CSAFPID-1635319",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1635322",
"CSAFPID-1635323",
"CSAFPID-1635324",
"CSAFPID-1635325",
"CSAFPID-1635326",
"CSAFPID-1635327",
"CSAFPID-1635328",
"CSAFPID-1635329",
"CSAFPID-220055",
"CSAFPID-1503577",
"CSAFPID-764237",
"CSAFPID-912085",
"CSAFPID-1503578",
"CSAFPID-1503579",
"CSAFPID-1503580",
"CSAFPID-912101",
"CSAFPID-1503581",
"CSAFPID-1503322",
"CSAFPID-912069",
"CSAFPID-764240",
"CSAFPID-912547",
"CSAFPID-1503582",
"CSAFPID-912549",
"CSAFPID-1503583",
"CSAFPID-1503584",
"CSAFPID-1503585",
"CSAFPID-1503586",
"CSAFPID-1503587",
"CSAFPID-1503588",
"CSAFPID-1503316",
"CSAFPID-1503317",
"CSAFPID-764242",
"CSAFPID-1503589",
"CSAFPID-1503590",
"CSAFPID-220132",
"CSAFPID-912079",
"CSAFPID-1503591",
"CSAFPID-816789",
"CSAFPID-816790",
"CSAFPID-1503592",
"CSAFPID-1503593",
"CSAFPID-1503594",
"CSAFPID-1503595",
"CSAFPID-342804",
"CSAFPID-1503596",
"CSAFPID-1503597",
"CSAFPID-1503598",
"CSAFPID-816792",
"CSAFPID-764247",
"CSAFPID-912556",
"CSAFPID-764735",
"CSAFPID-816793",
"CSAFPID-1503599",
"CSAFPID-1503600",
"CSAFPID-342793",
"CSAFPID-816350",
"CSAFPID-1261",
"CSAFPID-342803",
"CSAFPID-816354",
"CSAFPID-204563",
"CSAFPID-764738",
"CSAFPID-816355",
"CSAFPID-1503601",
"CSAFPID-1503602",
"CSAFPID-240600",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1727475",
"CSAFPID-1751238",
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-1751082",
"CSAFPID-1751240",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-1673481",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-34750",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Exceptional Conditions",
"title": "CWE-755"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34750",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34750.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673481",
"CSAFPID-1503596",
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751242",
"CSAFPID-1751243",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-34750"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751246",
"CSAFPID-1751247",
"CSAFPID-1751248",
"CSAFPID-1673530",
"CSAFPID-1673393",
"CSAFPID-1751239",
"CSAFPID-220132",
"CSAFPID-1751082",
"CSAFPID-1672767",
"CSAFPID-1751241",
"CSAFPID-912079",
"CSAFPID-916906",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-37370",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37370",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37370.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255"
]
}
],
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"cwe": {
"id": "CWE-130",
"name": "Improper Handling of Length Parameter Inconsistency"
},
"notes": [
{
"category": "other",
"text": "Improper Handling of Length Parameter Inconsistency",
"title": "CWE-130"
}
],
"product_status": {
"known_affected": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37371",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37371.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-912549",
"CSAFPID-1673413",
"CSAFPID-1673414",
"CSAFPID-1673396",
"CSAFPID-1503590",
"CSAFPID-1673393",
"CSAFPID-1673395",
"CSAFPID-1673399",
"CSAFPID-1672767",
"CSAFPID-1503585",
"CSAFPID-1673392",
"CSAFPID-1503589",
"CSAFPID-1673415",
"CSAFPID-1673389",
"CSAFPID-1673390",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751237",
"CSAFPID-1751254",
"CSAFPID-1751217",
"CSAFPID-1673481",
"CSAFPID-1751255",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673395",
"CSAFPID-1673396",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751225",
"CSAFPID-1751254",
"CSAFPID-1673530",
"CSAFPID-1751217",
"CSAFPID-1751255",
"CSAFPID-816790",
"CSAFPID-1751258",
"CSAFPID-1673481",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38475",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Encoding or Escaping of Output",
"title": "CWE-116"
},
{
"category": "other",
"text": "Path Traversal: \u0027.../...//\u0027",
"title": "CWE-35"
},
{
"category": "other",
"text": "Stack-based Buffer Overflow",
"title": "CWE-121"
},
{
"category": "other",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "other",
"text": "Use of Hard-coded Credentials",
"title": "CWE-798"
},
{
"category": "other",
"text": "Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG)",
"title": "CWE-338"
}
],
"references": [
{
"category": "self",
"summary": "CVE-2024-38475",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38475.json"
}
],
"title": "CVE-2024-38475"
},
{
"cve": "CVE-2024-38807",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Cryptographic Signature",
"title": "CWE-347"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38807",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38807.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751090",
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38807"
},
{
"cve": "CVE-2024-38809",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-1673393"
]
}
],
"title": "CVE-2024-38809"
},
{
"cve": "CVE-2024-38816",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Relative Path Traversal",
"title": "CWE-23"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38816",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38816.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673420",
"CSAFPID-1673421",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1751081",
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751082",
"CSAFPID-1751225"
]
}
],
"title": "CVE-2024-38816"
},
{
"cve": "CVE-2024-38819",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38819",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38819.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1673393",
"CSAFPID-1751079",
"CSAFPID-1751080",
"CSAFPID-1751081",
"CSAFPID-1751082",
"CSAFPID-1751084",
"CSAFPID-1751085",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38819"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751080",
"CSAFPID-1751082",
"CSAFPID-1751085",
"CSAFPID-1672767",
"CSAFPID-1751241"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-38827",
"cwe": {
"id": "CWE-639",
"name": "Authorization Bypass Through User-Controlled Key"
},
"notes": [
{
"category": "other",
"text": "Authorization Bypass Through User-Controlled Key",
"title": "CWE-639"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38827",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38827.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-204510",
"CSAFPID-204569",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-38827"
},
{
"cve": "CVE-2024-38998",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38998.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38998"
},
{
"cve": "CVE-2024-38999",
"cwe": {
"id": "CWE-1321",
"name": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improperly Controlled Modification of Object Prototype Attributes (\u0027Prototype Pollution\u0027)",
"title": "CWE-1321"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38999",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38999.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 10.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-912073",
"CSAFPID-1751254",
"CSAFPID-1751079",
"CSAFPID-1751242",
"CSAFPID-1751234",
"CSAFPID-1673496",
"CSAFPID-1751233",
"CSAFPID-1751255",
"CSAFPID-1673481",
"CSAFPID-1751085",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-38999"
},
{
"cve": "CVE-2024-41817",
"cwe": {
"id": "CWE-427",
"name": "Uncontrolled Search Path Element"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Search Path Element",
"title": "CWE-427"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-41817",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-41817.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1650731",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-220132",
"CSAFPID-912079"
]
}
],
"title": "CVE-2024-41817"
},
{
"cve": "CVE-2024-45490",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "other",
"text": "Incorrect Calculation of Buffer Size",
"title": "CWE-131"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45490",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45490.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45490"
},
{
"cve": "CVE-2024-45491",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45491",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45491.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45491"
},
{
"cve": "CVE-2024-45492",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-45492",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-45492.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1673382",
"CSAFPID-1673399",
"CSAFPID-1650731",
"CSAFPID-1673517",
"CSAFPID-1673396",
"CSAFPID-1674617",
"CSAFPID-1674618",
"CSAFPID-1674619",
"CSAFPID-1674620",
"CSAFPID-1674621",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1674624",
"CSAFPID-1674625",
"CSAFPID-1674626",
"CSAFPID-1674627",
"CSAFPID-1674628",
"CSAFPID-1635305",
"CSAFPID-1635306",
"CSAFPID-1635307",
"CSAFPID-1635308",
"CSAFPID-1635309",
"CSAFPID-1670434",
"CSAFPID-1674629",
"CSAFPID-1635315",
"CSAFPID-1635316",
"CSAFPID-1635318",
"CSAFPID-1674630",
"CSAFPID-1674631",
"CSAFPID-1674632",
"CSAFPID-1674633",
"CSAFPID-1674634",
"CSAFPID-1674635",
"CSAFPID-1635323",
"CSAFPID-1674636",
"CSAFPID-1635324",
"CSAFPID-1674637",
"CSAFPID-1674638",
"CSAFPID-1674639",
"CSAFPID-1674640",
"CSAFPID-1674641",
"CSAFPID-1674642",
"CSAFPID-1635320",
"CSAFPID-1635321",
"CSAFPID-1674643",
"CSAFPID-1674644",
"CSAFPID-1674645",
"CSAFPID-1674646",
"CSAFPID-1673414",
"CSAFPID-1503590"
]
}
],
"title": "CVE-2024-45492"
},
{
"cve": "CVE-2024-47535",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751233",
"CSAFPID-1751234",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47535"
},
{
"cve": "CVE-2024-47554",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751292",
"CSAFPID-1751234",
"CSAFPID-1751294",
"CSAFPID-1751233",
"CSAFPID-1751295",
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47554"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751296",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2024-47803",
"cwe": {
"id": "CWE-209",
"name": "Generation of Error Message Containing Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Generation of Error Message Containing Sensitive Information",
"title": "CWE-209"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47803"
},
{
"cve": "CVE-2024-47804",
"cwe": {
"id": "CWE-863",
"name": "Incorrect Authorization"
},
"notes": [
{
"category": "other",
"text": "Incorrect Authorization",
"title": "CWE-863"
},
{
"category": "other",
"text": "Insufficient Granularity of Access Control",
"title": "CWE-1220"
},
{
"category": "other",
"text": "Access of Resource Using Incompatible Type (\u0027Type Confusion\u0027)",
"title": "CWE-843"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47804.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1672767",
"CSAFPID-1751300",
"CSAFPID-1751241",
"CSAFPID-1751081",
"CSAFPID-1751084",
"CSAFPID-1673393",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-47804"
},
{
"cve": "CVE-2024-49766",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49766",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49766.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751246",
"CSAFPID-1751209"
]
}
],
"title": "CVE-2024-49766"
},
{
"cve": "CVE-2024-49767",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-49767",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-49767.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751208",
"CSAFPID-1751080",
"CSAFPID-1751079",
"CSAFPID-1751225",
"CSAFPID-1751082",
"CSAFPID-1751300",
"CSAFPID-1751246",
"CSAFPID-1751209",
"CSAFPID-1673393",
"CSAFPID-1751085",
"CSAFPID-1751231"
]
}
],
"title": "CVE-2024-49767"
},
{
"cve": "CVE-2024-50379",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50379",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50379.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-50379"
},
{
"cve": "CVE-2024-50602",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Improper Check for Unusual or Exceptional Conditions",
"title": "CWE-754"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-50602",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-50602.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751225",
"CSAFPID-1751079",
"CSAFPID-1751082",
"CSAFPID-1751085"
]
}
],
"title": "CVE-2024-50602"
},
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2024-54677",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-54677",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-54677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-54677"
},
{
"cve": "CVE-2024-56337",
"cwe": {
"id": "CWE-367",
"name": "Time-of-check Time-of-use (TOCTOU) Race Condition"
},
"notes": [
{
"category": "other",
"text": "Time-of-check Time-of-use (TOCTOU) Race Condition",
"title": "CWE-367"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816790"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-56337",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-56337.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-816790"
]
}
],
"title": "CVE-2024-56337"
},
{
"cve": "CVE-2025-21542",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21542",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21542.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21542"
},
{
"cve": "CVE-2025-21544",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21544",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21544.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21544"
},
{
"cve": "CVE-2025-21554",
"product_status": {
"known_affected": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21554",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21554.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-224790",
"CSAFPID-221118",
"CSAFPID-1673496",
"CSAFPID-1751377",
"CSAFPID-1751378",
"CSAFPID-1751379",
"CSAFPID-1751380",
"CSAFPID-1751381",
"CSAFPID-1751382",
"CSAFPID-1751383",
"CSAFPID-1674619",
"CSAFPID-1674622",
"CSAFPID-1674623",
"CSAFPID-1751384",
"CSAFPID-1751385",
"CSAFPID-1751386"
]
}
],
"title": "CVE-2025-21554"
}
]
}
NCSC-2025-0219
Vulnerability from csaf_ncscnl - Published: 2025-07-09 08:29 - Updated: 2025-07-09 08:29Notes
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "SAP heeft kwetsbaarheden verholpen in verschillende producten, waaronder SAP S/4HANA, SAP SCM, en SAP NetWeaver.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten onder andere remote code execution, code injectie, en insecure deserialization, die door aanvallers met gebruikersprivileges kunnen worden misbruikt om schadelijke code te cre\u00ebren of uit te voeren. Dit kan leiden tot ernstige bedreigingen voor de vertrouwelijkheid, integriteit en beschikbaarheid van de getroffen systemen. Specifieke kwetsbaarheden zoals een replay-aanval en privilege-escalatie zijn ook ge\u00efdentificeerd, wat de noodzaak benadrukt voor strikte autorisatiecontroles en monitoring van de systemen. De impact varieert van ongeautoriseerde toegang tot gegevens tot volledige systeemcompromittering.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "SAP heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "general",
"text": "Use of Single-factor Authentication",
"title": "CWE-308"
},
{
"category": "general",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
},
{
"category": "general",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"title": "CWE-80"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "general",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - certbundde",
"url": "https://support.sap.com/en/my-support/knowledge-base/security-notes-news/july-2025.html"
}
],
"title": "Kwetsbaarheden verholpen in SAP producten",
"tracking": {
"current_release_date": "2025-07-09T08:29:00.474865Z",
"generator": {
"date": "2025-06-05T14:45:00Z",
"engine": {
"name": "V.A.",
"version": "1.1"
}
},
"id": "NCSC-2025-0219",
"initial_release_date": "2025-07-09T08:29:00.474865Z",
"revision_history": [
{
"date": "2025-07-09T08:29:00.474865Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/scmapo713",
"product": {
"name": "vers:unknown/scmapo713",
"product_id": "CSAFPID-2961744"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/103",
"product": {
"name": "vers:unknown/103",
"product_id": "CSAFPID-2961747"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/104",
"product": {
"name": "vers:unknown/104",
"product_id": "CSAFPID-2961748"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/106",
"product": {
"name": "vers:unknown/106",
"product_id": "CSAFPID-2961750"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/107",
"product": {
"name": "vers:unknown/107",
"product_id": "CSAFPID-2961751"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/108",
"product": {
"name": "vers:unknown/108",
"product_id": "CSAFPID-2961752"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2961754"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2961755"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/712",
"product": {
"name": "vers:unknown/712",
"product_id": "CSAFPID-2961756"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/714",
"product": {
"name": "vers:unknown/714",
"product_id": "CSAFPID-2961745"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/s4core102",
"product": {
"name": "vers:unknown/s4core102",
"product_id": "CSAFPID-2961746"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/s4coreop105",
"product": {
"name": "vers:unknown/s4coreop105",
"product_id": "CSAFPID-2961749"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/scm700",
"product": {
"name": "vers:unknown/scm700",
"product_id": "CSAFPID-2961753"
}
}
],
"category": "product_name",
"name": "SAP S/4HANA and SAP SCM (Characteristic Propagation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/4core 102",
"product": {
"name": "vers:unknown/4core 102",
"product_id": "CSAFPID-2962518"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/103",
"product": {
"name": "vers:unknown/103",
"product_id": "CSAFPID-2962520"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/104",
"product": {
"name": "vers:unknown/104",
"product_id": "CSAFPID-2962521"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/106",
"product": {
"name": "vers:unknown/106",
"product_id": "CSAFPID-2962522"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/107",
"product": {
"name": "vers:unknown/107",
"product_id": "CSAFPID-2962523"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/108",
"product": {
"name": "vers:unknown/108",
"product_id": "CSAFPID-2962524"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4coreop 105",
"product": {
"name": "vers:unknown/4coreop 105",
"product_id": "CSAFPID-2962519"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2962525"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2962526"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/712",
"product": {
"name": "vers:unknown/712",
"product_id": "CSAFPID-2962527"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/714",
"product": {
"name": "vers:unknown/714",
"product_id": "CSAFPID-2962528"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cm 700",
"product": {
"name": "vers:unknown/cm 700",
"product_id": "CSAFPID-2962529"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cmapo 713",
"product": {
"name": "vers:unknown/cmapo 713",
"product_id": "CSAFPID-2962530"
}
}
],
"category": "product_name",
"name": "S4HANA, SCM"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/200",
"product": {
"name": "vers:unknown/200",
"product_id": "CSAFPID-2962567"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/300",
"product": {
"name": "vers:unknown/300",
"product_id": "CSAFPID-2962568"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/400",
"product": {
"name": "vers:unknown/400",
"product_id": "CSAFPID-2962569"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2962570"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2962571"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/731",
"product": {
"name": "vers:unknown/731",
"product_id": "CSAFPID-2962572"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/740",
"product": {
"name": "vers:unknown/740",
"product_id": "CSAFPID-2962573"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/750",
"product": {
"name": "vers:unknown/750",
"product_id": "CSAFPID-2962574"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/751",
"product": {
"name": "vers:unknown/751",
"product_id": "CSAFPID-2962575"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/752",
"product": {
"name": "vers:unknown/752",
"product_id": "CSAFPID-2962576"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/753",
"product": {
"name": "vers:unknown/753",
"product_id": "CSAFPID-2962577"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/754",
"product": {
"name": "vers:unknown/754",
"product_id": "CSAFPID-2962578"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/755",
"product": {
"name": "vers:unknown/755",
"product_id": "CSAFPID-2962579"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/756",
"product": {
"name": "vers:unknown/756",
"product_id": "CSAFPID-2962580"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/757",
"product": {
"name": "vers:unknown/757",
"product_id": "CSAFPID-2962581"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/758",
"product": {
"name": "vers:unknown/758",
"product_id": "CSAFPID-2962582"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/816",
"product": {
"name": "vers:unknown/816",
"product_id": "CSAFPID-2962583"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/dw4core 100",
"product": {
"name": "vers:unknown/dw4core 100",
"product_id": "CSAFPID-2962584"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw 700",
"product": {
"name": "vers:unknown/sap_bw 700",
"product_id": "CSAFPID-2962585"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw_virtual_comp 701",
"product": {
"name": "vers:unknown/sap_bw_virtual_comp 701",
"product_id": "CSAFPID-2962586"
}
}
],
"category": "product_name",
"name": "Business Warehouse, BW-4HANA BEx Tools"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/200",
"product": {
"name": "vers:unknown/200",
"product_id": "CSAFPID-2961658"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/300",
"product": {
"name": "vers:unknown/300",
"product_id": "CSAFPID-2961659"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/400",
"product": {
"name": "vers:unknown/400",
"product_id": "CSAFPID-2961660"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2961662"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2961663"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/731",
"product": {
"name": "vers:unknown/731",
"product_id": "CSAFPID-2961664"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/740",
"product": {
"name": "vers:unknown/740",
"product_id": "CSAFPID-2961665"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/750",
"product": {
"name": "vers:unknown/750",
"product_id": "CSAFPID-2961666"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/751",
"product": {
"name": "vers:unknown/751",
"product_id": "CSAFPID-2961667"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/752",
"product": {
"name": "vers:unknown/752",
"product_id": "CSAFPID-2961668"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/753",
"product": {
"name": "vers:unknown/753",
"product_id": "CSAFPID-2961669"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/754",
"product": {
"name": "vers:unknown/754",
"product_id": "CSAFPID-2961670"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/755",
"product": {
"name": "vers:unknown/755",
"product_id": "CSAFPID-2961671"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/756",
"product": {
"name": "vers:unknown/756",
"product_id": "CSAFPID-2961672"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/757",
"product": {
"name": "vers:unknown/757",
"product_id": "CSAFPID-2961673"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/758",
"product": {
"name": "vers:unknown/758",
"product_id": "CSAFPID-2961674"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/816",
"product": {
"name": "vers:unknown/816",
"product_id": "CSAFPID-2961675"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/dw4core100",
"product": {
"name": "vers:unknown/dw4core100",
"product_id": "CSAFPID-2961657"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw700",
"product": {
"name": "vers:unknown/sap_bw700",
"product_id": "CSAFPID-2961661"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw_virtual_comp701",
"product": {
"name": "vers:unknown/sap_bw_virtual_comp701",
"product_id": "CSAFPID-2961676"
}
}
],
"category": "product_name",
"name": "SAP Business Warehouse and SAP BW/4HANA BEx Tools"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/103",
"product": {
"name": "vers:unknown/103",
"product_id": "CSAFPID-2633874"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/104",
"product": {
"name": "vers:unknown/104",
"product_id": "CSAFPID-2633871"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/106",
"product": {
"name": "vers:unknown/106",
"product_id": "CSAFPID-2633875"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/107",
"product": {
"name": "vers:unknown/107",
"product_id": "CSAFPID-2633870"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/108",
"product": {
"name": "vers:unknown/108",
"product_id": "CSAFPID-2633873"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4core_102",
"product": {
"name": "vers:unknown/4core_102",
"product_id": "CSAFPID-2633872"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4coreop_105",
"product": {
"name": "vers:unknown/4coreop_105",
"product_id": "CSAFPID-2963755"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2844389"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2844388"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/712",
"product": {
"name": "vers:unknown/712",
"product_id": "CSAFPID-2834788"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/714",
"product": {
"name": "vers:unknown/714",
"product_id": "CSAFPID-2834786"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cm_700",
"product": {
"name": "vers:unknown/cm_700",
"product_id": "CSAFPID-2963767"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cmapo_713",
"product": {
"name": "vers:unknown/cmapo_713",
"product_id": "CSAFPID-2963758"
}
}
],
"category": "product_name",
"name": "s/4hana"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/103",
"product": {
"name": "vers:unknown/103",
"product_id": "CSAFPID-2963760"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/104",
"product": {
"name": "vers:unknown/104",
"product_id": "CSAFPID-2963764"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/106",
"product": {
"name": "vers:unknown/106",
"product_id": "CSAFPID-2963756"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/107",
"product": {
"name": "vers:unknown/107",
"product_id": "CSAFPID-2963761"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/108",
"product": {
"name": "vers:unknown/108",
"product_id": "CSAFPID-2963753"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4core_102",
"product": {
"name": "vers:unknown/4core_102",
"product_id": "CSAFPID-2963762"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/4coreop_105",
"product": {
"name": "vers:unknown/4coreop_105",
"product_id": "CSAFPID-2963759"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2963754"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2963766"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/712",
"product": {
"name": "vers:unknown/712",
"product_id": "CSAFPID-2963757"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/714",
"product": {
"name": "vers:unknown/714",
"product_id": "CSAFPID-2963752"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cm_700",
"product": {
"name": "vers:unknown/cm_700",
"product_id": "CSAFPID-2963763"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/cmapo_713",
"product": {
"name": "vers:unknown/cmapo_713",
"product_id": "CSAFPID-2963765"
}
}
],
"category": "product_name",
"name": "scm"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/7.50",
"product": {
"name": "vers:unknown/7.50",
"product_id": "CSAFPID-2962477"
}
}
],
"category": "product_name",
"name": "NetWeaver Enterprise Portal Federated Portal Network"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/7.50",
"product": {
"name": "vers:unknown/7.50",
"product_id": "CSAFPID-2962517"
}
}
],
"category": "product_name",
"name": "NetWeaver Enterprise Portal Administration"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/j2ee-apps7.50",
"product": {
"name": "vers:unknown/j2ee-apps7.50",
"product_id": "CSAFPID-2961757"
}
}
],
"category": "product_name",
"name": "SAP NetWeaver (XML Data Archiving Service)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/lmnwabasicapps7.50",
"product": {
"name": "vers:unknown/lmnwabasicapps7.50",
"product_id": "CSAFPID-2961721"
}
}
],
"category": "product_name",
"name": "SAP NetWeaver Application Server for Java (Log Viewer )"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 700",
"product": {
"name": "vers:unknown/sap_basis 700",
"product_id": "CSAFPID-2962531"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 701",
"product": {
"name": "vers:unknown/sap_basis 701",
"product_id": "CSAFPID-2962532"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 702",
"product": {
"name": "vers:unknown/sap_basis 702",
"product_id": "CSAFPID-2962533"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 731",
"product": {
"name": "vers:unknown/sap_basis 731",
"product_id": "CSAFPID-2962534"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 740",
"product": {
"name": "vers:unknown/sap_basis 740",
"product_id": "CSAFPID-2962535"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 750",
"product": {
"name": "vers:unknown/sap_basis 750",
"product_id": "CSAFPID-2962536"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 751",
"product": {
"name": "vers:unknown/sap_basis 751",
"product_id": "CSAFPID-2962537"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 752",
"product": {
"name": "vers:unknown/sap_basis 752",
"product_id": "CSAFPID-2962538"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 753",
"product": {
"name": "vers:unknown/sap_basis 753",
"product_id": "CSAFPID-2962539"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 754",
"product": {
"name": "vers:unknown/sap_basis 754",
"product_id": "CSAFPID-2962540"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 755",
"product": {
"name": "vers:unknown/sap_basis 755",
"product_id": "CSAFPID-2962541"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 756",
"product": {
"name": "vers:unknown/sap_basis 756",
"product_id": "CSAFPID-2962542"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 757",
"product": {
"name": "vers:unknown/sap_basis 757",
"product_id": "CSAFPID-2962543"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 758",
"product": {
"name": "vers:unknown/sap_basis 758",
"product_id": "CSAFPID-2962544"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 914",
"product": {
"name": "vers:unknown/sap_basis 914",
"product_id": "CSAFPID-2962545"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_basis 915",
"product": {
"name": "vers:unknown/sap_basis 915",
"product_id": "CSAFPID-2962546"
}
}
],
"category": "product_name",
"name": "NetWeaver ABAP Server, ABAP Platform"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/2027",
"product": {
"name": "vers:unknown/2027",
"product_id": "CSAFPID-2961582"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/enterprise430",
"product": {
"name": "vers:unknown/enterprise430",
"product_id": "CSAFPID-2455796"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/enterpriseclienttools430",
"product": {
"name": "vers:unknown/enterpriseclienttools430",
"product_id": "CSAFPID-2961583"
}
}
],
"category": "product_name",
"name": "SAP BusinessObjects Business Intelligence Platform (Web Intelligence)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/200",
"product": {
"name": "vers:unknown/200",
"product_id": "CSAFPID-2962615"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/300",
"product": {
"name": "vers:unknown/300",
"product_id": "CSAFPID-2962616"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/400",
"product": {
"name": "vers:unknown/400",
"product_id": "CSAFPID-2962617"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2962618"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2962619"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/731",
"product": {
"name": "vers:unknown/731",
"product_id": "CSAFPID-2962620"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/740",
"product": {
"name": "vers:unknown/740",
"product_id": "CSAFPID-2962621"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/750",
"product": {
"name": "vers:unknown/750",
"product_id": "CSAFPID-2962622"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/751",
"product": {
"name": "vers:unknown/751",
"product_id": "CSAFPID-2962623"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/752",
"product": {
"name": "vers:unknown/752",
"product_id": "CSAFPID-2962624"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/753",
"product": {
"name": "vers:unknown/753",
"product_id": "CSAFPID-2962625"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/754",
"product": {
"name": "vers:unknown/754",
"product_id": "CSAFPID-2962626"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/755",
"product": {
"name": "vers:unknown/755",
"product_id": "CSAFPID-2962627"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/756",
"product": {
"name": "vers:unknown/756",
"product_id": "CSAFPID-2962628"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/757",
"product": {
"name": "vers:unknown/757",
"product_id": "CSAFPID-2962629"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/758",
"product": {
"name": "vers:unknown/758",
"product_id": "CSAFPID-2962630"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/816",
"product": {
"name": "vers:unknown/816",
"product_id": "CSAFPID-2962631"
}
}
],
"category": "product_name",
"name": "NetWeaver Business Warehouse"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/701",
"product": {
"name": "vers:unknown/701",
"product_id": "CSAFPID-2905139"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/702",
"product": {
"name": "vers:unknown/702",
"product_id": "CSAFPID-2905140"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/731",
"product": {
"name": "vers:unknown/731",
"product_id": "CSAFPID-2905141"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/740",
"product": {
"name": "vers:unknown/740",
"product_id": "CSAFPID-2905142"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/750",
"product": {
"name": "vers:unknown/750",
"product_id": "CSAFPID-2962587"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/751",
"product": {
"name": "vers:unknown/751",
"product_id": "CSAFPID-2905143"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/752",
"product": {
"name": "vers:unknown/752",
"product_id": "CSAFPID-2905144"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/753",
"product": {
"name": "vers:unknown/753",
"product_id": "CSAFPID-2905145"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/754",
"product": {
"name": "vers:unknown/754",
"product_id": "CSAFPID-2905146"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/755",
"product": {
"name": "vers:unknown/755",
"product_id": "CSAFPID-2905147"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/756",
"product": {
"name": "vers:unknown/756",
"product_id": "CSAFPID-2905148"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/758",
"product": {
"name": "vers:unknown/758",
"product_id": "CSAFPID-2905150"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/757",
"product": {
"name": "vers:unknown/757",
"product_id": "CSAFPID-2905149"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/816",
"product": {
"name": "vers:unknown/816",
"product_id": "CSAFPID-2962588"
}
}
],
"category": "product_name",
"name": "Business Warehouse and Plug-In Basis"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/7.22ext",
"product": {
"name": "vers:unknown/7.22ext",
"product_id": "CSAFPID-2961535"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_ 7.53",
"product": {
"name": "vers:unknown/sap_ 7.53",
"product_id": "CSAFPID-2962481"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_car7.53",
"product": {
"name": "vers:unknown/sap_car7.53",
"product_id": "CSAFPID-2961534"
}
}
],
"category": "product_name",
"name": "SAPCAR"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/dw4core100",
"product": {
"name": "vers:unknown/dw4core100",
"product_id": "CSAFPID-2961678"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw730",
"product": {
"name": "vers:unknown/sap_bw730",
"product_id": "CSAFPID-2961683"
}
}
],
"category": "product_name",
"name": "SAP Business Warehouse (Business Explorer Web 3.5 loading animation)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/dw4core 100",
"product": {
"name": "vers:unknown/dw4core 100",
"product_id": "CSAFPID-2962457"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw 700",
"product": {
"name": "vers:unknown/sap_bw 700",
"product_id": "CSAFPID-2962458"
}
},
{
"category": "product_version_range",
"name": "vers:unknown/sap_bw_virtual_comp 701",
"product": {
"name": "vers:unknown/sap_bw_virtual_comp 701",
"product_id": "CSAFPID-2962459"
}
}
],
"category": "product_name",
"name": "BusinessObjects Content Administrator workbench"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/dw4core_100",
"product": {
"name": "vers:unknown/dw4core_100",
"product_id": "CSAFPID-2962888"
}
}
],
"category": "product_name",
"name": "businessobjects_content_administrator_workbench"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/dw4core100",
"product": {
"name": "vers:unknown/dw4core100",
"product_id": "CSAFPID-2961701"
}
}
],
"category": "product_name",
"name": "SAP BusinessObjects Content Administrator workbench"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/bc-fes-gui8.00",
"product": {
"name": "vers:unknown/bc-fes-gui8.00",
"product_id": "CSAFPID-1987640"
}
}
],
"category": "product_name",
"name": "SAP GUI for Windows"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/sbop_ds_management_console4.3",
"product": {
"name": "vers:unknown/sbop_ds_management_console4.3",
"product_id": "CSAFPID-2961694"
}
}
],
"category": "product_name",
"name": "SAP Data Services (DQ Report)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/st-pi2008_1_700",
"product": {
"name": "vers:unknown/st-pi2008_1_700",
"product_id": "CSAFPID-1987620"
}
}
],
"category": "product_name",
"name": "SAP NetWeaver and ABAP Platform (SDCCN)"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/engineapi7.50",
"product": {
"name": "vers:unknown/engineapi7.50",
"product_id": "CSAFPID-2961698"
}
}
],
"category": "product_name",
"name": "SAP NetWeaver Application Server Java"
}
],
"category": "vendor",
"name": "SAP"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-42967",
"cwe": {
"id": "CWE-94",
"name": "Improper Control of Generation of Code (\u0027Code Injection\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"title": "CWE-94"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42967 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42967.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42967"
},
{
"cve": "CVE-2025-42980",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42980 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42980.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42980"
},
{
"cve": "CVE-2025-42964",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42964 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42964.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42964"
},
{
"cve": "CVE-2025-42966",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42966 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42966.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42966"
},
{
"cve": "CVE-2025-42963",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42963 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42963.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42963"
},
{
"cve": "CVE-2025-42959",
"cwe": {
"id": "CWE-308",
"name": "Use of Single-factor Authentication"
},
"notes": [
{
"category": "other",
"text": "Use of Single-factor Authentication",
"title": "CWE-308"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42959 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42959.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42959"
},
{
"cve": "CVE-2025-42953",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42953 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42953.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42953"
},
{
"cve": "CVE-2024-53677",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "other",
"text": "Unrestricted Upload of File with Dangerous Type",
"title": "CWE-434"
},
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-53677 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2024/cve-2024-53677.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2024-53677"
},
{
"cve": "CVE-2025-42952",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42952 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42952.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42952"
},
{
"cve": "CVE-2025-43001",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"notes": [
{
"category": "other",
"text": "Incorrect Privilege Assignment",
"title": "CWE-266"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43001 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43001.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-43001"
},
{
"cve": "CVE-2025-42981",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42981 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42981.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42981"
},
{
"cve": "CVE-2025-42969",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42969 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42969.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42969"
},
{
"cve": "CVE-2025-42962",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42962 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42962.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42962"
},
{
"cve": "CVE-2025-42985",
"cwe": {
"id": "CWE-601",
"name": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)"
},
"notes": [
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42985 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42985.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42985"
},
{
"cve": "CVE-2025-42970",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42970 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42970.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42970"
},
{
"cve": "CVE-2025-42979",
"cwe": {
"id": "CWE-922",
"name": "Insecure Storage of Sensitive Information"
},
"notes": [
{
"category": "other",
"text": "Insecure Storage of Sensitive Information",
"title": "CWE-922"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42979 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42979.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42979"
},
{
"cve": "CVE-2025-42973",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42973 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42973.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42973"
},
{
"cve": "CVE-2025-42968",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42968 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42968.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.0,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42968"
},
{
"cve": "CVE-2025-42961",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42961 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42961.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42961"
},
{
"cve": "CVE-2025-42960",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42960 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42960.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42960"
},
{
"cve": "CVE-2025-42986",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42986 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42986.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42986"
},
{
"cve": "CVE-2025-42974",
"cwe": {
"id": "CWE-862",
"name": "Missing Authorization"
},
"notes": [
{
"category": "other",
"text": "Missing Authorization",
"title": "CWE-862"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42974 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42974.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42974"
},
{
"cve": "CVE-2025-31326",
"cwe": {
"id": "CWE-80",
"name": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)",
"title": "CWE-80"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-31326 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-31326.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-31326"
},
{
"cve": "CVE-2025-42965",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42965 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42965.json"
}
],
"title": "CVE-2025-42965"
},
{
"cve": "CVE-2025-42971",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42971 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42971.json"
}
],
"title": "CVE-2025-42971"
},
{
"cve": "CVE-2025-42978",
"cwe": {
"id": "CWE-940",
"name": "Improper Verification of Source of a Communication Channel"
},
"notes": [
{
"category": "other",
"text": "Improper Verification of Source of a Communication Channel",
"title": "CWE-940"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42978 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42978.json"
}
],
"title": "CVE-2025-42978"
},
{
"cve": "CVE-2025-42954",
"cwe": {
"id": "CWE-835",
"name": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)"
},
"notes": [
{
"category": "other",
"text": "Loop with Unreachable Exit Condition (\u0027Infinite Loop\u0027)",
"title": "CWE-835"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-42954 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-42954.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-2961744",
"CSAFPID-2962518",
"CSAFPID-2962567",
"CSAFPID-2962568",
"CSAFPID-2962569",
"CSAFPID-2962570",
"CSAFPID-2962571",
"CSAFPID-2962572",
"CSAFPID-2962573",
"CSAFPID-2962574",
"CSAFPID-2962575",
"CSAFPID-2962576",
"CSAFPID-2962577",
"CSAFPID-2962578",
"CSAFPID-2962579",
"CSAFPID-2962580",
"CSAFPID-2962581",
"CSAFPID-2962582",
"CSAFPID-2962583",
"CSAFPID-2962584",
"CSAFPID-2962585",
"CSAFPID-2962586",
"CSAFPID-2962520",
"CSAFPID-2962521",
"CSAFPID-2962522",
"CSAFPID-2962523",
"CSAFPID-2962524",
"CSAFPID-2962519",
"CSAFPID-2962525",
"CSAFPID-2962526",
"CSAFPID-2962527",
"CSAFPID-2962528",
"CSAFPID-2962529",
"CSAFPID-2962530",
"CSAFPID-2961658",
"CSAFPID-2961659",
"CSAFPID-2961660",
"CSAFPID-2961662",
"CSAFPID-2961663",
"CSAFPID-2961664",
"CSAFPID-2961665",
"CSAFPID-2961666",
"CSAFPID-2961667",
"CSAFPID-2961668",
"CSAFPID-2961669",
"CSAFPID-2961670",
"CSAFPID-2961671",
"CSAFPID-2961672",
"CSAFPID-2961673",
"CSAFPID-2961674",
"CSAFPID-2961675",
"CSAFPID-2961657",
"CSAFPID-2961661",
"CSAFPID-2961676",
"CSAFPID-2961747",
"CSAFPID-2961748",
"CSAFPID-2961750",
"CSAFPID-2961751",
"CSAFPID-2961752",
"CSAFPID-2961754",
"CSAFPID-2961755",
"CSAFPID-2961756",
"CSAFPID-2961745",
"CSAFPID-2961746",
"CSAFPID-2961749",
"CSAFPID-2961753",
"CSAFPID-2633874",
"CSAFPID-2633871",
"CSAFPID-2633875",
"CSAFPID-2633870",
"CSAFPID-2633873",
"CSAFPID-2633872",
"CSAFPID-2963755",
"CSAFPID-2844389",
"CSAFPID-2844388",
"CSAFPID-2834788",
"CSAFPID-2834786",
"CSAFPID-2963767",
"CSAFPID-2963758",
"CSAFPID-2963760",
"CSAFPID-2963764",
"CSAFPID-2963756",
"CSAFPID-2963761",
"CSAFPID-2963753",
"CSAFPID-2963762",
"CSAFPID-2963759",
"CSAFPID-2963754",
"CSAFPID-2963766",
"CSAFPID-2963757",
"CSAFPID-2963752",
"CSAFPID-2963763",
"CSAFPID-2963765",
"CSAFPID-2962477",
"CSAFPID-2962517",
"CSAFPID-2961757",
"CSAFPID-2961721",
"CSAFPID-2962531",
"CSAFPID-2962532",
"CSAFPID-2962533",
"CSAFPID-2962534",
"CSAFPID-2962535",
"CSAFPID-2962536",
"CSAFPID-2962537",
"CSAFPID-2962538",
"CSAFPID-2962539",
"CSAFPID-2962540",
"CSAFPID-2962541",
"CSAFPID-2962542",
"CSAFPID-2962543",
"CSAFPID-2962544",
"CSAFPID-2962545",
"CSAFPID-2962546",
"CSAFPID-2961582",
"CSAFPID-2455796",
"CSAFPID-2961583",
"CSAFPID-2962615",
"CSAFPID-2962616",
"CSAFPID-2962617",
"CSAFPID-2962618",
"CSAFPID-2962619",
"CSAFPID-2962620",
"CSAFPID-2962621",
"CSAFPID-2962622",
"CSAFPID-2962623",
"CSAFPID-2962624",
"CSAFPID-2962625",
"CSAFPID-2962626",
"CSAFPID-2962627",
"CSAFPID-2962628",
"CSAFPID-2962629",
"CSAFPID-2962630",
"CSAFPID-2962631",
"CSAFPID-2905139",
"CSAFPID-2905140",
"CSAFPID-2905141",
"CSAFPID-2905142",
"CSAFPID-2962587",
"CSAFPID-2905143",
"CSAFPID-2905144",
"CSAFPID-2905145",
"CSAFPID-2905146",
"CSAFPID-2905147",
"CSAFPID-2905148",
"CSAFPID-2905150",
"CSAFPID-2905149",
"CSAFPID-2962588",
"CSAFPID-2961535",
"CSAFPID-2962481",
"CSAFPID-2961678",
"CSAFPID-2961683",
"CSAFPID-2962457",
"CSAFPID-2962888",
"CSAFPID-2961701",
"CSAFPID-2962458",
"CSAFPID-2962459",
"CSAFPID-2961534",
"CSAFPID-1987640",
"CSAFPID-2961694",
"CSAFPID-1987620",
"CSAFPID-2961698"
]
}
],
"title": "CVE-2025-42954"
}
]
}
FKIE_CVE-2024-53677
Vulnerability from fkie_nvd - Published: 2024-12-11 16:15 - Updated: 2025-07-15 16:30| URL | Tags | ||
|---|---|---|---|
| security@apache.org | https://cwiki.apache.org/confluence/display/WW/S2-067 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250103-0005/ | Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:struts:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BAB5D8EE-6237-4CB6-B363-E1B6982E44EE",
"versionEndExcluding": "6.4.0",
"versionStartIncluding": "2.0.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "File upload logic in Apache Struts is flawed.\u00a0An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload . If you are not using an old file upload logic based on\u00a0FileuploadInterceptor\u00a0your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"lang": "es",
"value": "La l\u00f3gica de carga de archivos es una vulnerabilidad defectuosa en Apache Struts. Este problema afecta a Apache Struts: desde la versi\u00f3n 2.0.0 hasta la 6.4.0. Se recomienda a los usuarios que actualicen a la versi\u00f3n 6.4.0, que soluciona el problema. Puede encontrar m\u00e1s detalles en https://cwiki.apache.org/confluence/display/WW/S2-067"
}
],
"id": "CVE-2024-53677",
"lastModified": "2025-07-15T16:30:19.423",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
],
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "YES",
"Recovery": "AUTOMATIC",
"Safety": "NEGLIGIBLE",
"attackComplexity": "HIGH",
"attackRequirements": "PRESENT",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 9.5,
"baseSeverity": "CRITICAL",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "RED",
"subAvailabilityImpact": "HIGH",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "HIGH",
"userInteraction": "NONE",
"valueDensity": "CONCENTRATED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:N/AU:Y/R:A/V:C/RE:L/U:Red",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "LOW"
},
"source": "security@apache.org",
"type": "Secondary"
}
]
},
"published": "2024-12-11T16:15:14.593",
"references": [
{
"source": "security@apache.org",
"tags": [
"Third Party Advisory"
],
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.netapp.com/advisory/ntap-20250103-0005/"
}
],
"sourceIdentifier": "security@apache.org",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-434"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-43MQ-6XMG-29VM
Vulnerability from github – Published: 2024-12-11 18:30 – Updated: 2025-07-15 23:05File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 .
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.struts:struts2-core"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.4.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-53677"
],
"database_specific": {
"cwe_ids": [
"CWE-22",
"CWE-434",
"CWE-915"
],
"github_reviewed": true,
"github_reviewed_at": "2024-12-11T22:02:54Z",
"nvd_published_at": "2024-12-11T16:15:14Z",
"severity": "CRITICAL"
},
"details": "File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.\n\nThis issue affects Apache Struts: from 2.0.0 before 6.4.0.\n\nUsers are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.\n\nYou can find more details in\u00a0 https://cwiki.apache.org/confluence/display/WW/S2-067 .",
"id": "GHSA-43mq-6xmg-29vm",
"modified": "2025-07-15T23:05:23Z",
"published": "2024-12-11T18:30:42Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53677"
},
{
"type": "WEB",
"url": "https://github.com/apache/struts/commit/1ecfbae46543a83e131404f8dcc84b3d0d554854"
},
{
"type": "WEB",
"url": "https://github.com/apache/struts/commit/3ef9ade8902a63bb560892453eeca02bfddefc78"
},
{
"type": "WEB",
"url": "https://github.com/apache/struts/commit/930fef7679d7247db9e460c146b1698a9d7ad1e4"
},
{
"type": "WEB",
"url": "https://cwiki.apache.org/confluence/display/WW/S2-067"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/struts"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20250103-0005"
},
{
"type": "WEB",
"url": "https://struts.apache.org/core-developers/file-upload"
},
{
"type": "WEB",
"url": "https://www.dynatrace.com/news/blog/the-anatomy-of-broken-apache-struts-2-a-technical-deep-dive-into-cve-2024-53677"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red",
"type": "CVSS_V4"
}
],
"summary": "Apache Struts file upload logic is flawed"
}
CNVD-2024-47916
Vulnerability from cnvd - Published: 2024-12-12厂商已发布了漏洞修复程序,请及时关注更新: https://github.com/apache/struts/releases
| Name | ['Apache struts >=2.0.0,<=2.3.37(EOL)', 'Apache struts >=2.5.0,<=2.5.33', 'Apache struts >=6.0.0,<=6.3.0.2'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2024-53677"
}
},
"description": "Apache Struts\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u4e2a\u5f00\u6e90\u9879\u76ee\uff0c\u662f\u4e00\u5957\u7528\u4e8e\u521b\u5efa\u4f01\u4e1a\u7ea7Java Web\u5e94\u7528\u7684\u5f00\u6e90MVC\u6846\u67b6\uff0c\u4e3b\u8981\u63d0\u4f9b\u4e24\u4e2a\u7248\u672c\u6846\u67b6\u4ea7\u54c1\uff0cStruts 1\u548cStruts 2\u3002\n\nApache Struts\u5b58\u5728\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4e0a\u4f20\u6076\u610f\u6587\u4ef6\uff0c\u5bfc\u81f4\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://github.com/apache/struts/releases",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2024-47916",
"openTime": "2024-12-12",
"patchDescription": "Apache Struts\u662f\u7f8e\u56fd\u963f\u5e15\u5947\uff08Apache\uff09\u57fa\u91d1\u4f1a\u7684\u4e00\u4e2a\u5f00\u6e90\u9879\u76ee\uff0c\u662f\u4e00\u5957\u7528\u4e8e\u521b\u5efa\u4f01\u4e1a\u7ea7Java Web\u5e94\u7528\u7684\u5f00\u6e90MVC\u6846\u67b6\uff0c\u4e3b\u8981\u63d0\u4f9b\u4e24\u4e2a\u7248\u672c\u6846\u67b6\u4ea7\u54c1\uff0cStruts 1\u548cStruts 2\u3002\r\n\r\nApache Struts\u5b58\u5728\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u4e0a\u4f20\u6076\u610f\u6587\u4ef6\uff0c\u5bfc\u81f4\u8fdc\u7a0b\u6267\u884c\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Apache Struts\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Apache struts \u003e=2.0.0\uff0c\u003c=2.3.37\uff08EOL\uff09",
"Apache struts \u003e=2.5.0\uff0c\u003c=2.5.33",
"Apache struts \u003e=6.0.0\uff0c\u003c=6.3.0.2"
]
},
"referenceLink": "https://cwiki.apache.org/confluence/display/WW/S2-067",
"serverity": "\u9ad8",
"submitTime": "2024-12-12",
"title": "Apache Struts\u6587\u4ef6\u4e0a\u4f20\u6f0f\u6d1e"
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.