Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-3421 (GCVE-0-2021-3421)
Vulnerability from cvelistv5 – Published: 2021-05-19 13:40 – Updated: 2024-08-03 16:53| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T16:53:17.462Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "FEDORA-2021-2383d950fd",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/"
},
{
"name": "FEDORA-2021-8d52a8a999",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
},
{
"name": "FEDORA-2021-662680e477",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA",
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"name": "GLSA-202107-43",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/202107-43"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "rpm",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "rpm 4.17.0-alpha"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "CWE-347",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-07-20T10:07:20",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "FEDORA-2021-2383d950fd",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/"
},
{
"name": "FEDORA-2021-8d52a8a999",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
},
{
"name": "FEDORA-2021-662680e477",
"tags": [
"vendor-advisory",
"x_refsource_FEDORA"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"name": "GLSA-202107-43",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/202107-43"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-3421",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rpm",
"version": {
"version_data": [
{
"version_value": "rpm 4.17.0-alpha"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-347"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2021-2383d950fd",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/"
},
{
"name": "FEDORA-2021-8d52a8a999",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
},
{
"name": "FEDORA-2021-662680e477",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"name": "GLSA-202107-43",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202107-43"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2021-3421",
"datePublished": "2021-05-19T13:40:58",
"dateReserved": "2021-03-03T00:00:00",
"dateUpdated": "2024-08-03T16:53:17.462Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"4.16.1.3\", \"matchCriteriaId\": \"E210A7F5-C9AD-41DB-8E5A-2D48615DF02B\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"36D96259-24BD-44E2-96D9-78CE1D41F956\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.\"}, {\"lang\": \"es\", \"value\": \"Se encontr\\u00f3 un fallo en el paquete RPM en la funcionalidad read.\u0026#xa0;Este fallo permite a un atacante que pueda convencer a una v\\u00edctima de instalar un paquete aparentemente comprobable o comprometer un repositorio de RPM, causar una corrupci\\u00f3n en la base de datos de RPM.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la integridad de los datos.\u0026#xa0;Este fallo afecta a versiones de RPM anteriores a 4.17.0-alpha\"}]",
"id": "CVE-2021-3421",
"lastModified": "2024-11-21T06:21:27.903",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2021-05-19T14:15:07.457",
"references": "[{\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1927747\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://security.gentoo.org/glsa/202107-43\", \"source\": \"secalert@redhat.com\", \"tags\": [\"Third Party Advisory\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=1927747\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\", \"Third Party Advisory\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/202107-43\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\"]}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"secalert@redhat.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-347\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-3421\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2021-05-19T14:15:07.457\",\"lastModified\":\"2024-11-21T06:21:27.903\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 un fallo en el paquete RPM en la funcionalidad read.\u0026#xa0;Este fallo permite a un atacante que pueda convencer a una v\u00edctima de instalar un paquete aparentemente comprobable o comprometer un repositorio de RPM, causar una corrupci\u00f3n en la base de datos de RPM.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la integridad de los datos.\u0026#xa0;Este fallo afecta a versiones de RPM anteriores a 4.17.0-alpha\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-347\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.16.1.3\",\"matchCriteriaId\":\"E210A7F5-C9AD-41DB-8E5A-2D48615DF02B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36D96259-24BD-44E2-96D9-78CE1D41F956\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E460AA51-FCDA-46B9-AE97-E6676AA5E194\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A930E247-0B43-43CB-98FF-6CE7B8189835\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1927747\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://security.gentoo.org/glsa/202107-43\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=1927747\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/202107-43\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
FKIE_CVE-2021-3421
Vulnerability from fkie_nvd - Published: 2021-05-19 14:15 - Updated: 2024-11-21 06:21| Vendor | Product | Version | |
|---|---|---|---|
| rpm | rpm | * | |
| redhat | enterprise_linux | 8.0 | |
| fedoraproject | fedora | 32 | |
| fedoraproject | fedora | 33 | |
| fedoraproject | fedora | 34 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*",
"matchCriteriaId": "E210A7F5-C9AD-41DB-8E5A-2D48615DF02B",
"versionEndExcluding": "4.16.1.3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"matchCriteriaId": "E460AA51-FCDA-46B9-AE97-E6676AA5E194",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"matchCriteriaId": "A930E247-0B43-43CB-98FF-6CE7B8189835",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha."
},
{
"lang": "es",
"value": "Se encontr\u00f3 un fallo en el paquete RPM en la funcionalidad read.\u0026#xa0;Este fallo permite a un atacante que pueda convencer a una v\u00edctima de instalar un paquete aparentemente comprobable o comprometer un repositorio de RPM, causar una corrupci\u00f3n en la base de datos de RPM.\u0026#xa0;La mayor amenaza de esta vulnerabilidad es la integridad de los datos.\u0026#xa0;Este fallo afecta a versiones de RPM anteriores a 4.17.0-alpha"
}
],
"id": "CVE-2021-3421",
"lastModified": "2024-11-21T06:21:27.903",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-05-19T14:15:07.457",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202107-43"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202107-43"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
],
"source": "secalert@redhat.com",
"type": "Primary"
}
]
}
WID-SEC-W-2022-2020
Vulnerability from csaf_certbund - Published: 2021-03-31 22:00 - Updated: 2023-07-23 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der RPM Package Manager (RPM) ist ein Kommandozeilen Paket-Management Tool zur Installation, Deinstallation, \u00dcberpr\u00fcfung, Abfrage und Aktualisieren von Software-Paketen auf Linux Systemen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann mehrere Schwachstellen in RPM und Red Hat Enterprise Linux ausnutzen, um beliebigen Programmcode mit den Rechten des Dienstes auszuf\u00fchren und um Daten zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2022-2020 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2022-2020.json"
},
{
"category": "self",
"summary": "WID-SEC-2022-2020 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2020"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2023-069 vom 2023-07-21",
"url": "https://www.dell.com/support/kbdoc/de-de/000210964/dsa-2023-069-dell-networker-vproxy-security-update-for-multiple-vulnerabilities-detected-on-vproxy-4-3-0-38"
},
{
"category": "external",
"summary": "Github - rpm-Software-Management vom 2021-03-31",
"url": "https://github.com/rpm-software-management/rpm/commit/d6a86b5e69e46cc283b1e06c92343319beb42e21"
},
{
"category": "external",
"summary": "Bug 1934125 vom 2021-03-31",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2574 vom 2021-06-29",
"url": "https://access.redhat.com/errata/RHSA-2021:2574"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2021-2574 vom 2021-06-30",
"url": "https://linux.oracle.com/errata/ELSA-2021-2574.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2021-1521 vom 2021-07-13",
"url": "https://alas.aws.amazon.com/ALAS-2021-1521.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2021-1689 vom 2021-07-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1689.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202107-43 vom 2021-07-20",
"url": "https://security.gentoo.org/glsa/202107-43"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:2791 vom 2021-07-21",
"url": "https://access.redhat.com/errata/RHSA-2021:2791"
},
{
"category": "external",
"summary": "AVAYA Security Advisory ASA-2021-097 vom 2021-07-30",
"url": "https://downloads.avaya.com/css/P8/documents/101076864"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3016 vom 2021-08-06",
"url": "https://access.redhat.com/errata/RHSA-2021:3016"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3024 vom 2021-08-09",
"url": "https://access.redhat.com/errata/RHSA-2021:3024"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3119 vom 2021-08-10",
"url": "https://access.redhat.com/errata/RHSA-2021:3119"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2682-1 vom 2021-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3229 vom 2021-08-20",
"url": "https://access.redhat.com/errata/RHSA-2021:3229"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3259 vom 2021-08-25",
"url": "https://access.redhat.com/errata/RHSA-2021:3259"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3361 vom 2021-08-31",
"url": "https://access.redhat.com/errata/RHSA-2021:3361"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3556 vom 2021-09-17",
"url": "https://access.redhat.com/errata/RHSA-2021:3556"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3444-1 vom 2021-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3444-1 vom 2021-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009600.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4785 vom 2021-11-23",
"url": "https://access.redhat.com/errata/RHSA-2021:4785"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4771 vom 2021-11-23",
"url": "https://access.redhat.com/errata/RHSA-2021:4771"
},
{
"category": "external",
"summary": "CentOS Security Advisory CESA-2021:4785 vom 2021-12-01",
"url": "https://lists.centos.org/pipermail/centos-announce/2021-December/048415.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:4975 vom 2021-12-07",
"url": "https://access.redhat.com/errata/RHSA-2021:4975"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3445-1 vom 2022-04-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010661.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2022:3939-1 vom 2022-11-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012871.html"
}
],
"source_lang": "en-US",
"title": "RPM: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-07-23T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:37:54.756+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2022-2020",
"initial_release_date": "2021-03-31T22:00:00.000+00:00",
"revision_history": [
{
"date": "2021-03-31T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-06-29T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-07-12T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2021-07-18T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2021-07-19T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2021-07-20T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-01T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von AVAYA aufgenommen"
},
{
"date": "2021-08-05T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-08T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-10T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-12T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-08-19T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-24T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-08-30T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-09-16T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-10-17T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-11-23T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-12-01T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von CentOS aufgenommen"
},
{
"date": "2021-12-07T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2022-04-05T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-11-10T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-07-23T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "22"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Avaya Aura Experience Portal",
"product": {
"name": "Avaya Aura Experience Portal",
"product_id": "T015519",
"product_identification_helper": {
"cpe": "cpe:/a:avaya:aura_experience_portal:-"
}
}
}
],
"category": "vendor",
"name": "Avaya"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker vProxy \u003c 4.3.0-40",
"product": {
"name": "Dell NetWorker vProxy \u003c 4.3.0-40",
"product_id": "T028847",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__4.3.0-40"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source CentOS",
"product": {
"name": "Open Source CentOS",
"product_id": "1727",
"product_identification_helper": {
"cpe": "cpe:/o:centos:centos:-"
}
}
},
{
"category": "product_name",
"name": "Open Source RPM",
"product": {
"name": "Open Source RPM",
"product_id": "T018754",
"product_identification_helper": {
"cpe": "cpe:/a:rpm:rpm:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux 8.0",
"product": {
"name": "Red Hat Enterprise Linux 8.0",
"product_id": "458746",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8.0"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20271",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in RPM. Der Fehler besteht in der Signaturpr\u00fcfung beim Lesen einer Paketdatei. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um die Datenbank zu besch\u00e4digen und beliebigen Code auszuf\u00fchren. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen ein scheinbar verifizierbares Paket zu installieren."
}
],
"product_status": {
"known_affected": [
"T015519",
"458746",
"T002207",
"T028847",
"398363",
"T012167",
"1727",
"T004914"
]
},
"release_date": "2021-03-31T22:00:00.000+00:00",
"title": "CVE-2021-20271"
},
{
"cve": "CVE-2021-3421",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in RPM in der Lesefunktionalit\u00e4t. Ein lokaler Angreifer kann diese Sicherheitsl\u00fccke ausnutzen, um die Datenbank zu besch\u00e4digen."
}
],
"product_status": {
"known_affected": [
"458746",
"T002207",
"T028847",
"398363",
"T012167",
"1727",
"T004914"
]
},
"release_date": "2021-03-31T22:00:00.000+00:00",
"title": "CVE-2021-3421"
}
]
}
WID-SEC-W-2023-1855
Vulnerability from csaf_certbund - Published: 2021-05-19 22:00 - Updated: 2023-07-23 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Der RPM Package Manager (RPM) ist ein Kommandozeilen Paket-Management Tool zur Installation, Deinstallation, \u00dcberpr\u00fcfung, Abfrage und Aktualisieren von Software-Paketen auf Linux Systemen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in RPM ausnutzen, um Dateien zu manipulieren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1855 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2021/wid-sec-w-2023-1855.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1855 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1855"
},
{
"category": "external",
"summary": "Dell Security Advisory DSA-2023-069 vom 2023-07-21",
"url": "https://www.dell.com/support/kbdoc/de-de/000210964/dsa-2023-069-dell-networker-vproxy-security-update-for-multiple-vulnerabilities-detected-on-vproxy-4-3-0-38"
},
{
"category": "external",
"summary": "Red Hat Bugzilla - Bug 1927747 vom 2021-05-19",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2021-1521 vom 2021-07-13",
"url": "https://alas.aws.amazon.com/ALAS-2021-1521.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2021-1689 vom 2021-07-16",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2021-1689.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202107-43 vom 2021-07-20",
"url": "https://security.gentoo.org/glsa/202107-43"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:2682-1 vom 2021-08-13",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2021:3556 vom 2021-09-17",
"url": "https://access.redhat.com/errata/RHSA-2021:3556"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3444-1 vom 2021-10-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3444-1 vom 2021-10-16",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009600.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2021:3445-1 vom 2022-04-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-April/010661.html"
}
],
"source_lang": "en-US",
"title": "RPM: Schwachstelle erm\u00f6glicht Manipulation von Dateien",
"tracking": {
"current_release_date": "2023-07-23T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:56:04.564+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1855",
"initial_release_date": "2021-05-19T22:00:00.000+00:00",
"revision_history": [
{
"date": "2021-05-19T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2021-07-12T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2021-07-18T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2021-07-19T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2021-08-12T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2021-09-16T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2021-10-17T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2022-04-05T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2023-07-23T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Dell aufgenommen"
}
],
"status": "final",
"version": "9"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Dell NetWorker vProxy \u003c 4.3.0-40",
"product": {
"name": "Dell NetWorker vProxy \u003c 4.3.0-40",
"product_id": "T028847",
"product_identification_helper": {
"cpe": "cpe:/a:dell:networker:vproxy__4.3.0-40"
}
}
}
],
"category": "vendor",
"name": "Dell"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source RPM \u003c 4.17.0",
"product": {
"name": "Open Source RPM \u003c 4.17.0",
"product_id": "T019392",
"product_identification_helper": {
"cpe": "cpe:/a:rpm:rpm:4.17.0"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3421",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in RPM, welche in der Read-Funktionalit\u00e4t besteht. Mit einem malizi\u00f6sen Paket kann diese Schwachstelle ausgenutzt werden, um die RPM-Datenbank zu manipulieren. Ein entfernter, anonymer Angreifer kann diese Schwachstelle ausnutzen, um Dateien zu manipulieren. Zur erfolgreichen Ausnutzung dieser Schwachstelle ist eine Benutzerinteraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T002207",
"67646",
"T028847",
"398363",
"T012167"
]
},
"release_date": "2021-05-19T22:00:00.000+00:00",
"title": "CVE-2021-3421"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2021-AVI-791
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.1.x antérieures à 11.1.7 FP3 | ||
| IBM | N/A | CP4S versions 1.7.0 à 1.7.2 antérieures à 1.8.0.0 | ||
| IBM | Cognos Analytics | IBM Cognos Analytics versions 11.2.x antérieures à 11.2.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "IBM Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 FP3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "CP4S versions 1.7.0 \u00e0 1.7.2 ant\u00e9rieures \u00e0 1.8.0.0",
"product": {
"name": "N/A",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "IBM Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.1",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-8315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8315"
},
{
"name": "CVE-2021-25215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25215"
},
{
"name": "CVE-2020-24977",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24977"
},
{
"name": "CVE-2020-13543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13543"
},
{
"name": "CVE-2021-23364",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23364"
},
{
"name": "CVE-2020-13434",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13434"
},
{
"name": "CVE-2021-3517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3517"
},
{
"name": "CVE-2021-23336",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23336"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2021-3537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3537"
},
{
"name": "CVE-2021-27290",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27290"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2017-12620",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12620"
},
{
"name": "CVE-2021-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27219"
},
{
"name": "CVE-2020-8622",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8622"
},
{
"name": "CVE-2020-29362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29362"
},
{
"name": "CVE-2020-9983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9983"
},
{
"name": "CVE-2021-1820",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1820"
},
{
"name": "CVE-2018-25011",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25011"
},
{
"name": "CVE-2020-26116",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26116"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2020-9951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9951"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-20305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20305"
},
{
"name": "CVE-2021-22918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22918"
},
{
"name": "CVE-2021-20578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20578"
},
{
"name": "CVE-2020-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8177"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2021-3450",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3450"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2019-13012",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13012"
},
{
"name": "CVE-2021-29679",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29679"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2021-2432",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2432"
},
{
"name": "CVE-2020-8624",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8624"
},
{
"name": "CVE-2021-33910",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33910"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2020-14362",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14362"
},
{
"name": "CVE-2021-3516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3516"
},
{
"name": "CVE-2019-3842",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3842"
},
{
"name": "CVE-2021-3449",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3449"
},
{
"name": "CVE-2021-1826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1826"
},
{
"name": "CVE-2020-8617",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8617"
},
{
"name": "CVE-2017-14502",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14502"
},
{
"name": "CVE-2020-29361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29361"
},
{
"name": "CVE-2021-1817",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1817"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2020-14347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14347"
},
{
"name": "CVE-2020-14360",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14360"
},
{
"name": "CVE-2021-1825",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-1825"
},
{
"name": "CVE-2020-13776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13776"
},
{
"name": "CVE-2020-14346",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14346"
},
{
"name": "CVE-2020-14361",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14361"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2021-30661",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30661"
},
{
"name": "CVE-2020-8927",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8927"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2020-29363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29363"
},
{
"name": "CVE-2021-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3609"
},
{
"name": "CVE-2021-22543",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22543"
},
{
"name": "CVE-2020-13584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13584"
},
{
"name": "CVE-2020-36328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36328"
},
{
"name": "CVE-2020-27619",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27619"
},
{
"name": "CVE-2020-8492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8492"
},
{
"name": "CVE-2019-9169",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9169"
},
{
"name": "CVE-2020-29573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29573"
},
{
"name": "CVE-2020-4951",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4951"
},
{
"name": "CVE-2021-3177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3177"
},
{
"name": "CVE-2020-8231",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8231"
},
{
"name": "CVE-2016-10228",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10228"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2021-22555",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22555"
},
{
"name": "CVE-2020-26137",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26137"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2021-27218",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27218"
},
{
"name": "CVE-2020-13933",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13933"
},
{
"name": "CVE-2020-14344",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14344"
},
{
"name": "CVE-2021-3541",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3541"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-24332",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24332"
},
{
"name": "CVE-2020-25712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25712"
},
{
"name": "CVE-2021-29745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29745"
},
{
"name": "CVE-2020-24330",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24330"
},
{
"name": "CVE-2020-36329",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36329"
},
{
"name": "CVE-2021-29894",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29894"
},
{
"name": "CVE-2020-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9948"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-23362",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23362"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3518",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3518"
},
{
"name": "CVE-2020-24331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24331"
},
{
"name": "CVE-2020-14345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14345"
},
{
"name": "CVE-2020-25692",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25692"
},
{
"name": "CVE-2020-8625",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8625"
}
],
"links": [],
"reference": "CERTFR-2021-AVI-791",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2021-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6491661 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6491661"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6493729 du 14 octobre 2021",
"url": "https://www.ibm.com/support/pages/node/6493729"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
GSD-2021-3421
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-3421",
"description": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"id": "GSD-2021-3421",
"references": [
"https://www.suse.com/security/cve/CVE-2021-3421.html",
"https://access.redhat.com/errata/RHSA-2021:2791",
"https://access.redhat.com/errata/RHSA-2021:2574",
"https://advisories.mageia.org/CVE-2021-3421.html",
"https://alas.aws.amazon.com/cve/html/CVE-2021-3421.html",
"https://ubuntu.com/security/CVE-2021-3421"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-3421"
],
"details": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"id": "GSD-2021-3421",
"modified": "2023-12-13T01:23:35.184844Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-3421",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "rpm",
"version": {
"version_data": [
{
"version_value": "rpm 4.17.0-alpha"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-347"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "FEDORA-2021-2383d950fd",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/"
},
{
"name": "FEDORA-2021-8d52a8a999",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
},
{
"name": "FEDORA-2021-662680e477",
"refsource": "FEDORA",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"name": "GLSA-202107-43",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/202107-43"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:rpm:rpm:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.16.1.3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2021-3421"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-347"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"name": "FEDORA-2021-2383d950fd",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC/"
},
{
"name": "FEDORA-2021-662680e477",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY/"
},
{
"name": "FEDORA-2021-8d52a8a999",
"refsource": "FEDORA",
"tags": [
"Mailing List",
"Third Party Advisory"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K/"
},
{
"name": "GLSA-202107-43",
"refsource": "GENTOO",
"tags": [
"Third Party Advisory"
],
"url": "https://security.gentoo.org/glsa/202107-43"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2022-06-03T18:53Z",
"publishedDate": "2021-05-19T14:15Z"
}
}
}
RHSA-2021_2791
Vulnerability from csaf_redhat - Published: 2021-07-20 22:25 - Updated: 2024-11-22 17:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rpm is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.\n\nSecurity Fix(es):\n\n* rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2791",
"url": "https://access.redhat.com/errata/RHSA-2021:2791"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1934125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2791.json"
}
],
"title": "Red Hat Security Advisory: rpm security update",
"tracking": {
"current_release_date": "2024-11-22T17:05:35+00:00",
"generator": {
"date": "2024-11-22T17:05:35+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2791",
"initial_release_date": "2021-07-20T22:25:39+00:00",
"revision_history": [
{
"date": "2021-07-20T22:25:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:25:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:05:35+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"product_id": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.2-38.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"product_id": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.2-38.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"product_id": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.2-38.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-build-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-build-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"product_id": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.2-38.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.src",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.src",
"product_id": "rpm-0:4.14.2-38.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"product": {
"name": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"product_id": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-apidocs@4.14.2-38.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"product": {
"name": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"product_id": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-cron@4.14.2-38.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-apidocs-0:4.14.2-38.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch"
},
"product_reference": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-cron-0:4.14.2-38.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch"
},
"product_reference": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-apidocs-0:4.14.2-38.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch"
},
"product_reference": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-cron-0:4.14.2-38.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch"
},
"product_reference": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Demi M. Obenour"
]
}
],
"cve": "CVE-2021-3421",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2021-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1927747"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: unsigned signature header leads to string injection into an rpm database",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM. It is strongly recommended to only use RPMs from trusted repositories.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "RHBZ#1927747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3421"
}
],
"release_date": "2021-03-11T22:51:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:25:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against the RPM library must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2791"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: unsigned signature header leads to string injection into an rpm database"
},
{
"acknowledgments": [
{
"names": [
"Demi M. Obenour"
]
}
],
"cve": "CVE-2021-20271",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1934125"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: Signature checks bypass via corrupted rpm package",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM. It is strongly recommended to only use RPMs from trusted repositories.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "RHBZ#1934125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20271"
}
],
"release_date": "2021-03-11T22:53:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:25:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against the RPM library must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2791"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: Signature checks bypass via corrupted rpm package"
}
]
}
RHSA-2021_2574
Vulnerability from csaf_redhat - Published: 2021-06-29 16:45 - Updated: 2024-11-22 17:05Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rpm is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.\n\nSecurity Fix(es):\n\n* rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2574",
"url": "https://access.redhat.com/errata/RHSA-2021:2574"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1934125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2574.json"
}
],
"title": "Red Hat Security Advisory: rpm security update",
"tracking": {
"current_release_date": "2024-11-22T17:05:28+00:00",
"generator": {
"date": "2024-11-22T17:05:28+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2021:2574",
"initial_release_date": "2021-06-29T16:45:27+00:00",
"revision_history": [
{
"date": "2021-06-29T16:45:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-06-29T16:45:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T17:05:28+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"product_id": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.3-14.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"product_id": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.3-14.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"product_id": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.3-14.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-build-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-build-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"product_id": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.3-14.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.src",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.src",
"product_id": "rpm-0:4.14.3-14.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"product": {
"name": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"product_id": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-apidocs@4.14.3-14.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"product": {
"name": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"product_id": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-cron@4.14.3-14.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-apidocs-0:4.14.3-14.el8_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch"
},
"product_reference": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-cron-0:4.14.3-14.el8_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch"
},
"product_reference": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-apidocs-0:4.14.3-14.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch"
},
"product_reference": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-cron-0:4.14.3-14.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch"
},
"product_reference": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Demi M. Obenour"
]
}
],
"cve": "CVE-2021-3421",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2021-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1927747"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: unsigned signature header leads to string injection into an rpm database",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM. It is strongly recommended to only use RPMs from trusted repositories.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "RHBZ#1927747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3421"
}
],
"release_date": "2021-03-11T22:51:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-29T16:45:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against the RPM library must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2574"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: unsigned signature header leads to string injection into an rpm database"
},
{
"acknowledgments": [
{
"names": [
"Demi M. Obenour"
]
}
],
"cve": "CVE-2021-20271",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1934125"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: Signature checks bypass via corrupted rpm package",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM. It is strongly recommended to only use RPMs from trusted repositories.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "RHBZ#1934125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20271"
}
],
"release_date": "2021-03-11T22:53:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-29T16:45:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against the RPM library must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2574"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: Signature checks bypass via corrupted rpm package"
}
]
}
RHSA-2021:2791
Vulnerability from csaf_redhat - Published: 2021-07-20 22:25 - Updated: 2025-11-21 18:24Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rpm is now available for Red Hat Enterprise Linux 8.2 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.\n\nSecurity Fix(es):\n\n* rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2791",
"url": "https://access.redhat.com/errata/RHSA-2021:2791"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1934125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2791.json"
}
],
"title": "Red Hat Security Advisory: rpm security update",
"tracking": {
"current_release_date": "2025-11-21T18:24:03+00:00",
"generator": {
"date": "2025-11-21T18:24:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:2791",
"initial_release_date": "2021-07-20T22:25:39+00:00",
"revision_history": [
{
"date": "2021-07-20T22:25:39+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-07-20T22:25:39+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:24:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"product_id": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.2-38.el8_2?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"product": {
"name": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"product_id": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.2-38.el8_2?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"product_id": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.2-38.el8_2?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"product": {
"name": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"product_id": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.2-38.el8_2?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"product_id": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.2-38.el8_2?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"product": {
"name": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"product_id": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.2-38.el8_2?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-build-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-build-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"product_id": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.2-38.el8_2?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"product": {
"name": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"product_id": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.2-38.el8_2?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-devel-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-devel-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-libs-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-libs-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"product_id": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.2-38.el8_2?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-0:4.14.2-38.el8_2.src",
"product": {
"name": "rpm-0:4.14.2-38.el8_2.src",
"product_id": "rpm-0:4.14.2-38.el8_2.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.2-38.el8_2?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"product": {
"name": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"product_id": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-apidocs@4.14.2-38.el8_2?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"product": {
"name": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"product_id": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-cron@4.14.2-38.el8_2?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.src as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-apidocs-0:4.14.2-38.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch"
},
"product_reference": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-cron-0:4.14.2-38.el8_2.noarch as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch"
},
"product_reference": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "python3-rpm-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.src as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-apidocs-0:4.14.2-38.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch"
},
"product_reference": "rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-cron-0:4.14.2-38.el8_2.noarch as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch"
},
"product_reference": "rpm-cron-0:4.14.2-38.el8_2.noarch",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-devel-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-libs-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-sign-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Demi M. Obenour"
]
}
],
"cve": "CVE-2021-3421",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2021-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1927747"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: unsigned signature header leads to string injection into an rpm database",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM. It is strongly recommended to only use RPMs from trusted repositories.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "RHBZ#1927747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3421"
}
],
"release_date": "2021-03-11T22:51:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:25:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against the RPM library must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2791"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: unsigned signature header leads to string injection into an rpm database"
},
{
"acknowledgments": [
{
"names": [
"Demi M. Obenour"
]
}
],
"cve": "CVE-2021-20271",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1934125"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: Signature checks bypass via corrupted rpm package",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM. It is strongly recommended to only use RPMs from trusted repositories.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "RHBZ#1934125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20271"
}
],
"release_date": "2021-03-11T22:53:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-07-20T22:25:39+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against the RPM library must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2791"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"AppStream-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"AppStream-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:python3-rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.src",
"BaseOS-8.2.0.Z.EUS:rpm-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-apidocs-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-build-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-cron-0:4.14.2-38.el8_2.noarch",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-debugsource-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-devel-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-libs-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-ima-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-selinux-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-syslog-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-0:4.14.2-38.el8_2.x86_64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.aarch64",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.i686",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.ppc64le",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.s390x",
"BaseOS-8.2.0.Z.EUS:rpm-sign-debuginfo-0:4.14.2-38.el8_2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: Signature checks bypass via corrupted rpm package"
}
]
}
RHSA-2021:2574
Vulnerability from csaf_redhat - Published: 2021-06-29 16:45 - Updated: 2025-11-21 18:23Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for rpm is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.\n\nSecurity Fix(es):\n\n* rpm: Signature checks bypass via corrupted rpm package (CVE-2021-20271)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2021:2574",
"url": "https://access.redhat.com/errata/RHSA-2021:2574"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1934125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2021/rhsa-2021_2574.json"
}
],
"title": "Red Hat Security Advisory: rpm security update",
"tracking": {
"current_release_date": "2025-11-21T18:23:42+00:00",
"generator": {
"date": "2025-11-21T18:23:42+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2021:2574",
"initial_release_date": "2021-06-29T16:45:27+00:00",
"revision_history": [
{
"date": "2021-06-29T16:45:27+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2021-06-29T16:45:27+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:23:42+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"product_id": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.3-14.el8_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"product": {
"name": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"product_id": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.3-14.el8_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"product_id": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.3-14.el8_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"product": {
"name": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"product_id": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.3-14.el8_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"product_id": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.3-14.el8_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"product": {
"name": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"product_id": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.3-14.el8_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-build-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-build-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"product_id": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit@4.14.3-14.el8_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"product": {
"name": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"product_id": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign@4.14.3-14.el8_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-devel-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-devel-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-libs-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-libs-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debugsource@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-rpm-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-build-libs-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-devel-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-libs-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-fapolicyd-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-ima-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-prioreset-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-selinux-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-syslog-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-plugin-systemd-inhibit-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"product": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"product_id": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-sign-debuginfo@4.14.3-14.el8_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-0:4.14.3-14.el8_4.src",
"product": {
"name": "rpm-0:4.14.3-14.el8_4.src",
"product_id": "rpm-0:4.14.3-14.el8_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm@4.14.3-14.el8_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"product": {
"name": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"product_id": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-apidocs@4.14.3-14.el8_4?arch=noarch"
}
}
},
{
"category": "product_version",
"name": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"product": {
"name": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"product_id": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/rpm-cron@4.14.3-14.el8_4?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-apidocs-0:4.14.3-14.el8_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch"
},
"product_reference": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-cron-0:4.14.3-14.el8_4.noarch as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch"
},
"product_reference": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "python3-rpm-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-apidocs-0:4.14.3-14.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch"
},
"product_reference": "rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-cron-0:4.14.3-14.el8_4.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch"
},
"product_reference": "rpm-cron-0:4.14.3-14.el8_4.noarch",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-devel-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-libs-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-sign-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
},
"product_reference": "rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Demi M. Obenour"
]
}
],
"cve": "CVE-2021-3421",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"discovery_date": "2021-01-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1927747"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: unsigned signature header leads to string injection into an rpm database",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM. It is strongly recommended to only use RPMs from trusted repositories.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "RHBZ#1927747",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-3421",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3421"
}
],
"release_date": "2021-03-11T22:51:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-29T16:45:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against the RPM library must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2574"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: unsigned signature header leads to string injection into an rpm database"
},
{
"acknowledgments": [
{
"names": [
"Demi M. Obenour"
]
}
],
"cve": "CVE-2021-20271",
"cwe": {
"id": "CWE-345",
"name": "Insufficient Verification of Data Authenticity"
},
"discovery_date": "2021-03-01T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1934125"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "rpm: Signature checks bypass via corrupted rpm package",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, an attacker must either compromise an RPM repository or convince an administrator to install an untrusted RPM. It is strongly recommended to only use RPMs from trusted repositories.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "RHBZ#1934125",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1934125"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-20271",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20271"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-20271",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20271"
}
],
"release_date": "2021-03-11T22:53:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-29T16:45:27+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against the RPM library must be restarted for this update to take effect.",
"product_ids": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2021:2574"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"AppStream-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:python3-rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.src",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-apidocs-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-build-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-cron-0:4.14.3-14.el8_4.noarch",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-debugsource-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-devel-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-libs-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-fapolicyd-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-ima-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-prioreset-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-selinux-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-syslog-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-plugin-systemd-inhibit-debuginfo-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-0:4.14.3-14.el8_4.x86_64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.aarch64",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.i686",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.ppc64le",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.s390x",
"BaseOS-8.4.0.Z.MAIN.EUS:rpm-sign-debuginfo-0:4.14.3-14.el8_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "rpm: Signature checks bypass via corrupted rpm package"
}
]
}
OPENSUSE-SU-2021:1366-1
Vulnerability from csaf_opensuse - Published: 2021-10-18 12:12 - Updated: 2021-10-18 12:12Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rpm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rpm fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2021-3421, CVE-2021-20271, CVE-2021-20266: Multiple header check improvements (bsc#1183543, bsc#1183545, bsc#1183632)\n- PGP hardening changes (bsc#1185299)\n- Fixed potential access of freed mem in ndb\u0027s glue code (bsc#1179416)\n\nMaintaince issues fixed:\n\n- Fixed zstd detection (bsc#1187670)\n- Added ndb rofs support (bsc#1188548)\n- Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)\n\nThis update was imported from the SUSE:SLE-15-SP2:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2021-1366",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_1366-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:1366-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOGLQWSIIR4HYRWXGETEIHB6SM6A2MNK/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:1366-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/WOGLQWSIIR4HYRWXGETEIHB6SM6A2MNK/"
},
{
"category": "self",
"summary": "SUSE Bug 1179416",
"url": "https://bugzilla.suse.com/1179416"
},
{
"category": "self",
"summary": "SUSE Bug 1183543",
"url": "https://bugzilla.suse.com/1183543"
},
{
"category": "self",
"summary": "SUSE Bug 1183545",
"url": "https://bugzilla.suse.com/1183545"
},
{
"category": "self",
"summary": "SUSE Bug 1183632",
"url": "https://bugzilla.suse.com/1183632"
},
{
"category": "self",
"summary": "SUSE Bug 1183659",
"url": "https://bugzilla.suse.com/1183659"
},
{
"category": "self",
"summary": "SUSE Bug 1185299",
"url": "https://bugzilla.suse.com/1185299"
},
{
"category": "self",
"summary": "SUSE Bug 1187670",
"url": "https://bugzilla.suse.com/1187670"
},
{
"category": "self",
"summary": "SUSE Bug 1188548",
"url": "https://bugzilla.suse.com/1188548"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20266 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20271 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3421 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3421/"
}
],
"title": "Security update for rpm",
"tracking": {
"current_release_date": "2021-10-18T12:12:22Z",
"generator": {
"date": "2021-10-18T12:12:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:1366-1",
"initial_release_date": "2021-10-18T12:12:22Z",
"revision_history": [
{
"date": "2021-10-18T12:12:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.1-lp152.18.3.1.i586",
"product": {
"name": "python2-rpm-4.14.1-lp152.18.3.1.i586",
"product_id": "python2-rpm-4.14.1-lp152.18.3.1.i586"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.1-lp152.18.3.1.i586",
"product": {
"name": "python3-rpm-4.14.1-lp152.18.3.1.i586",
"product_id": "python3-rpm-4.14.1-lp152.18.3.1.i586"
}
},
{
"category": "product_version",
"name": "rpm-4.14.1-lp152.18.3.1.i586",
"product": {
"name": "rpm-4.14.1-lp152.18.3.1.i586",
"product_id": "rpm-4.14.1-lp152.18.3.1.i586"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.1-lp152.18.3.1.i586",
"product": {
"name": "rpm-build-4.14.1-lp152.18.3.1.i586",
"product_id": "rpm-build-4.14.1-lp152.18.3.1.i586"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.1-lp152.18.3.1.i586",
"product": {
"name": "rpm-devel-4.14.1-lp152.18.3.1.i586",
"product_id": "rpm-devel-4.14.1-lp152.18.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"product": {
"name": "python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"product_id": "python2-rpm-4.14.1-lp152.18.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"product": {
"name": "python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"product_id": "python3-rpm-4.14.1-lp152.18.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-4.14.1-lp152.18.3.1.x86_64",
"product": {
"name": "rpm-4.14.1-lp152.18.3.1.x86_64",
"product_id": "rpm-4.14.1-lp152.18.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"product": {
"name": "rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"product_id": "rpm-32bit-4.14.1-lp152.18.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.1-lp152.18.3.1.x86_64",
"product": {
"name": "rpm-build-4.14.1-lp152.18.3.1.x86_64",
"product_id": "rpm-build-4.14.1-lp152.18.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.1-lp152.18.3.1.x86_64",
"product": {
"name": "rpm-devel-4.14.1-lp152.18.3.1.x86_64",
"product_id": "rpm-devel-4.14.1-lp152.18.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.2",
"product": {
"name": "openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.1-lp152.18.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586"
},
"product_reference": "python2-rpm-4.14.1-lp152.18.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.1-lp152.18.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64"
},
"product_reference": "python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.1-lp152.18.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586"
},
"product_reference": "python3-rpm-4.14.1-lp152.18.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.1-lp152.18.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64"
},
"product_reference": "python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.1-lp152.18.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586"
},
"product_reference": "rpm-4.14.1-lp152.18.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.1-lp152.18.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64"
},
"product_reference": "rpm-4.14.1-lp152.18.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.14.1-lp152.18.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64"
},
"product_reference": "rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-lp152.18.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586"
},
"product_reference": "rpm-build-4.14.1-lp152.18.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-lp152.18.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64"
},
"product_reference": "rpm-build-4.14.1-lp152.18.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.1-lp152.18.3.1.i586 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586"
},
"product_reference": "rpm-devel-4.14.1-lp152.18.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.1-lp152.18.3.1.x86_64 as component of openSUSE Leap 15.2",
"product_id": "openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
},
"product_reference": "rpm-devel-4.14.1-lp152.18.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20266"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20266",
"url": "https://www.suse.com/security/cve/CVE-2021-20266"
},
{
"category": "external",
"summary": "SUSE Bug 1183632 for CVE-2021-20266",
"url": "https://bugzilla.suse.com/1183632"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-18T12:12:22Z",
"details": "low"
}
],
"title": "CVE-2021-20266"
},
{
"cve": "CVE-2021-20271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20271"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20271",
"url": "https://www.suse.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "SUSE Bug 1183545 for CVE-2021-20271",
"url": "https://bugzilla.suse.com/1183545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-18T12:12:22Z",
"details": "low"
}
],
"title": "CVE-2021-20271"
},
{
"cve": "CVE-2021-3421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3421"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3421",
"url": "https://www.suse.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "SUSE Bug 1183543 for CVE-2021-3421",
"url": "https://bugzilla.suse.com/1183543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python2-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:python3-rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-32bit-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-build-4.14.1-lp152.18.3.1.x86_64",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.i586",
"openSUSE Leap 15.2:rpm-devel-4.14.1-lp152.18.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-18T12:12:22Z",
"details": "moderate"
}
],
"title": "CVE-2021-3421"
}
]
}
OPENSUSE-SU-2021:2682-1
Vulnerability from csaf_opensuse - Published: 2021-08-17 07:23 - Updated: 2021-08-17 07:23Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rpm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rpm fixes the following issues:\n\n- Changed default package verification level to \u0027none\u0027 to be compatible to rpm-4.14.1\n- Made illegal obsoletes a warning\n- Fixed a potential access of freed mem in ndb\u0027s glue code (bsc#1179416)\n- Added support for enforcing signature policy and payload verification step to\n transactions (jsc#SLE-17817)\n- Added :humansi and :hmaniec query formatters for human readable output\n- Added query selectors for whatobsoletes and whatconflicts\n- Added support for sorting caret higher than base version\n- rpm does no longer require the signature header to be in a contiguous\n region when signing (bsc#1181805)\n\nSecurity fixes:\n\n- CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an\n attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM\n repository, to cause RPM database corruption. The highest threat from this vulnerability is to\n data integrity (bsc#1183543)\n\n- CVE-2021-20271: A flaw was found in RPM\u0027s signature check functionality when reading a package file.\n This flaw allows an attacker who can convince a victim to install a seemingly verifiable package,\n whose signature header was modified, to cause RPM database corruption and execute code. The highest\n threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)\n\n- CVE-2021-20266: A flaw was found in RPM\u0027s hdrblobInit() in lib/header.c. This flaw allows an attacker\n who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability\n is to system availability.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2682",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2682-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2682-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2682-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQDL4MT3J7VM3IS3TI4EMLQJHDPTSZLZ/"
},
{
"category": "self",
"summary": "SUSE Bug 1179416",
"url": "https://bugzilla.suse.com/1179416"
},
{
"category": "self",
"summary": "SUSE Bug 1181805",
"url": "https://bugzilla.suse.com/1181805"
},
{
"category": "self",
"summary": "SUSE Bug 1183543",
"url": "https://bugzilla.suse.com/1183543"
},
{
"category": "self",
"summary": "SUSE Bug 1183545",
"url": "https://bugzilla.suse.com/1183545"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20266 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20271 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3421 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3421/"
}
],
"title": "Security update for rpm",
"tracking": {
"current_release_date": "2021-08-17T07:23:06Z",
"generator": {
"date": "2021-08-17T07:23:06Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2682-1",
"initial_release_date": "2021-08-17T07:23:06Z",
"revision_history": [
{
"date": "2021-08-17T07:23:06Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.3-37.2.aarch64",
"product": {
"name": "python2-rpm-4.14.3-37.2.aarch64",
"product_id": "python2-rpm-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.3-37.2.aarch64",
"product": {
"name": "python3-rpm-4.14.3-37.2.aarch64",
"product_id": "python3-rpm-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-4.14.3-37.2.aarch64",
"product": {
"name": "rpm-4.14.3-37.2.aarch64",
"product_id": "rpm-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.3-37.2.aarch64",
"product": {
"name": "rpm-build-4.14.3-37.2.aarch64",
"product_id": "rpm-build-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.3-37.2.aarch64",
"product": {
"name": "rpm-devel-4.14.3-37.2.aarch64",
"product_id": "rpm-devel-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.3-37.2.aarch64",
"product": {
"name": "rpm-ndb-4.14.3-37.2.aarch64",
"product_id": "rpm-ndb-4.14.3-37.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.3-37.2.ppc64le",
"product": {
"name": "python2-rpm-4.14.3-37.2.ppc64le",
"product_id": "python2-rpm-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.3-37.2.ppc64le",
"product": {
"name": "python3-rpm-4.14.3-37.2.ppc64le",
"product_id": "python3-rpm-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-4.14.3-37.2.ppc64le",
"product": {
"name": "rpm-4.14.3-37.2.ppc64le",
"product_id": "rpm-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.3-37.2.ppc64le",
"product": {
"name": "rpm-build-4.14.3-37.2.ppc64le",
"product_id": "rpm-build-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.3-37.2.ppc64le",
"product": {
"name": "rpm-devel-4.14.3-37.2.ppc64le",
"product_id": "rpm-devel-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.3-37.2.ppc64le",
"product": {
"name": "rpm-ndb-4.14.3-37.2.ppc64le",
"product_id": "rpm-ndb-4.14.3-37.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.3-37.2.s390x",
"product": {
"name": "python2-rpm-4.14.3-37.2.s390x",
"product_id": "python2-rpm-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.3-37.2.s390x",
"product": {
"name": "python3-rpm-4.14.3-37.2.s390x",
"product_id": "python3-rpm-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-4.14.3-37.2.s390x",
"product": {
"name": "rpm-4.14.3-37.2.s390x",
"product_id": "rpm-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.3-37.2.s390x",
"product": {
"name": "rpm-build-4.14.3-37.2.s390x",
"product_id": "rpm-build-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.3-37.2.s390x",
"product": {
"name": "rpm-devel-4.14.3-37.2.s390x",
"product_id": "rpm-devel-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.3-37.2.s390x",
"product": {
"name": "rpm-ndb-4.14.3-37.2.s390x",
"product_id": "rpm-ndb-4.14.3-37.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.3-37.2.x86_64",
"product": {
"name": "python2-rpm-4.14.3-37.2.x86_64",
"product_id": "python2-rpm-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.3-37.2.x86_64",
"product": {
"name": "python3-rpm-4.14.3-37.2.x86_64",
"product_id": "python3-rpm-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-4.14.3-37.2.x86_64",
"product_id": "rpm-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-32bit-4.14.3-37.2.x86_64",
"product_id": "rpm-32bit-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-build-4.14.3-37.2.x86_64",
"product_id": "rpm-build-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-devel-4.14.3-37.2.x86_64",
"product_id": "rpm-devel-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-ndb-4.14.3-37.2.x86_64",
"product_id": "rpm-ndb-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-ndb-32bit-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-ndb-32bit-4.14.3-37.2.x86_64",
"product_id": "rpm-ndb-32bit-4.14.3-37.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.3-37.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64"
},
"product_reference": "python2-rpm-4.14.3-37.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.3-37.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le"
},
"product_reference": "python2-rpm-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.3-37.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x"
},
"product_reference": "python2-rpm-4.14.3-37.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.3-37.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64"
},
"product_reference": "python2-rpm-4.14.3-37.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.3-37.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64"
},
"product_reference": "python3-rpm-4.14.3-37.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.3-37.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le"
},
"product_reference": "python3-rpm-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.3-37.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x"
},
"product_reference": "python3-rpm-4.14.3-37.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.3-37.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64"
},
"product_reference": "python3-rpm-4.14.3-37.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.3-37.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-4.14.3-37.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.3-37.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.3-37.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x"
},
"product_reference": "rpm-4.14.3-37.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.3-37.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-4.14.3-37.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.14.3-37.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-32bit-4.14.3-37.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-build-4.14.3-37.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-build-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x"
},
"product_reference": "rpm-build-4.14.3-37.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-build-4.14.3-37.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.3-37.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-devel-4.14.3-37.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.3-37.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-devel-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.3-37.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x"
},
"product_reference": "rpm-devel-4.14.3-37.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.3-37.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-devel-4.14.3-37.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.3-37.2.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-ndb-4.14.3-37.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.3-37.2.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-ndb-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.3-37.2.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x"
},
"product_reference": "rpm-ndb-4.14.3-37.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.3-37.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-ndb-4.14.3-37.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-32bit-4.14.3-37.2.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-ndb-32bit-4.14.3-37.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20266"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20266",
"url": "https://www.suse.com/security/cve/CVE-2021-20266"
},
{
"category": "external",
"summary": "SUSE Bug 1183632 for CVE-2021-20266",
"url": "https://bugzilla.suse.com/1183632"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-17T07:23:06Z",
"details": "low"
}
],
"title": "CVE-2021-20266"
},
{
"cve": "CVE-2021-20271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20271"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20271",
"url": "https://www.suse.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "SUSE Bug 1183545 for CVE-2021-20271",
"url": "https://bugzilla.suse.com/1183545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-17T07:23:06Z",
"details": "low"
}
],
"title": "CVE-2021-20271"
},
{
"cve": "CVE-2021-3421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3421"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3421",
"url": "https://www.suse.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "SUSE Bug 1183543 for CVE-2021-3421",
"url": "https://bugzilla.suse.com/1183543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python2-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:python3-rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-build-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-devel-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-32bit-4.14.3-37.2.x86_64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.aarch64",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.ppc64le",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.s390x",
"openSUSE Leap 15.3:rpm-ndb-4.14.3-37.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-17T07:23:06Z",
"details": "moderate"
}
],
"title": "CVE-2021-3421"
}
]
}
OPENSUSE-SU-2021:2685-1
Vulnerability from csaf_opensuse - Published: 2021-08-13 09:21 - Updated: 2021-08-13 09:21Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libdnf",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libdnf fixes the following issues:\n\n- Fixed crash when loading DVD repositories\n\nUpdate to 0.62.0\n\n+ Change order of TransactionItemReason (rh#1921063)\n+ Add two new comperators for security filters (rh#1918475)\n+ Apply security filters for candidates with lower priority\n+ Fix: Goal - translation of messages in global maps\n+ Enhance description of modular solvables\n+ Improve performance for module query \n+ Change mechanism of modular errata applicability (rh#1804234)\n+ dnf_transaction_commit(): Remove second call to rpmtsSetVSFlags\n+ Fix a couple of memory leaks\n+ Fix: Setting of librepo handle in newHandle function\n+ Remove failsafe data when module is not enabled (rh#1847035)\n+ Expose librepo\u0027s checksum functions via SWIG\n+ Fix: Mising check of \u0027hy_split_nevra()\u0027 return code\n+ Do not allow 1 as installonly_limit value (rh#1926261)\n+ Fix check whether the subkey can be used for signing\n+ Hardening: add signature check with rpmcliVerifySignatures \n (CVE-2021-3445, CVE-2021-3421, CVE-2021-20271, rh#1932079, rh#1932089, rh#1932090, bsc#1183779)\n+ Add a config option sslverifystatus, defaults to false (rh#1814383)\n+ [context] Add API for distro-sync\n\n- Fix dependency for repo-config-zypp subpackage to work with SLE\n\nUpdate to 0.60.0\n\n+ Fix repo.fresh() implementation\n+ Fix: Fully set ssl in newHandle function\n+ [conf] Add options for working with certificates used with proxy\n+ Apply proxy certificate options\n+ lock: Switch return-if-fail to assert to quiet gcc -fanalyzer\n+ build-sys: Clean up message about Python bindings\n+ Modify module NSVCA parsing - context definition (rh#1926771)\n+ [context] Fix: dnf_package_is_installonly (rh#1928056)\n+ Fix problematic language\n+ Add getApplicablePackages to advisory and isApplicable to advisorymodule\n+ Keep isAdvisoryApplicable to preserve API\n+ Run ModulePackageContainerTest tests in tmpdir, merge interdependent\n+ [context] Support config file option \u0027proxy_auth_method\u0027, defaults \u0027any\u0027\n+ Properly handle multiple collections in updateinfo.xml (rh#1804234)\n+ Support main config file option \u0027installonlypkgs\u0027\n+ Support main config file option \u0027protected_packages\u0027\n\n- Add repo-config-zypp subpackage to allow easily using Zypper\n repository configuration\n\n- Backport support for using certificates for repository authorization\n- Backport another fix for adding controls to installonlypkgs\n- Add patch to move directory for dnf state data to /usr/lib/sysimage\n- Backport fixes to add controls for installonlypkgs and protected_packages\n\nUpdate to version 0.58.0\n\n+ Option: Add reset() method\n+ Add OptionBinds::getOption() method\n+ [context] Add dnf_repo_conf_from_gkeyfile() and dnf_repo_conf_reset()\n+ [context] Add support for options: minrate, throttle, bandwidth, timeout\n+ [context] Remove g_key_file_get_string() from dnf_repo_set_keyfile_data()\n+ Allow loading ext metadata even if only cache (solv) is present\n+ Add ASAN_OPTIONS for test_libdnf_main\n+ [context,API] Functions for accessing main/global configuration options\n+ [context,API] Function for adding setopt\n+ Add getter for modular obsoletes from ModuleMetadata\n+ Add ModulePackage.getStaticContext() and getRequires()\n+ Add compatible layer for MdDocuments v2\n+ Fix modular queries with the new solver\n+ Improve formatting of error string for modules\n+ Change mechanism of module conflicts\n+ Fix load/update FailSafe\n\nUpdate to version 0.55.2\n\n+ Improve performance of query installed() and available()\n+ Swdb: Add a method to get the current transaction\n+ [modules] Add special handling for src artifacts (rh#1809314)\n+ Better msgs if \u0027basecachedir\u0027 or \u0027proxy_password\u0027 isn\u0027t set (rh#1888946)\n+ Add new options module_stream_switch\n+ Support allow_vendor_change setting in dnf context API\n\nUpdate to version 0.55.0\n\n+ Add vendor to dnf API (rh#1876561)\n+ Add formatting function for solver error\n+ Add error types in ModulePackageContainer\n+ Implement module enable for context part\n+ Improve string formatting for translation\n+ Remove redundant printf and change logging info to notice (rh#1827424)\n+ Add allow_vendor_change option (rh#1788371) (rh#1788371)\n\nUpdate to version 0.54.2\n\n+ history: Fix dnf history rollback when a package was removed (rh#1683134)\n+ Add support for HY_GT, HY_LT in query nevra_strict\n+ Fix parsing empty lines in config files\n+ Accept \u0027==\u0027 as an operator in reldeps (rh#1847946)\n+ Add log file level main config option (rh#1802074)\n+ Add protect_running_kernel configuration option (rh#1698145)\n+ Context part of libdnf cannot assume zchunk is on (rh#1851841, rh#1779104)\n+ Fix memory leak of resultingModuleIndex and handle g_object refs\n+ Redirect librepo logs to libdnf logs with different source\n+ Add hy_goal_lock\n+ Enum/String conversions for Transaction Store/Replay\n+ utils: Add a method to decode URLs\n+ Unify hawkey.log line format with the rest of the logs\n\nUpdate to version 0.48.0\n\n+ Add prereq_ignoreinst \u0026 regular_requires properties for pkg (rh#1543449)\n+ Reset active modules when no module enabled or default (rh#1767351)\n+ Add comment option to transaction (rh#1773679)\n+ Failing to get module defauls is a recoverable error\n+ Baseurl is not exclusive with mirrorlist/metalink (rh#1775184)\n+ Add new function to reset all modules in C API (dnf_context_reset_all_modules)\n+ [context] Fix to preserve additionalMetadata content (rh#1808677)\n+ Fix filtering of DepSolvables with source rpms (rh#1812596)\n+ Add setter for running kernel protection setting\n+ Handle situation when an unprivileged user cannot create history database (rh#1634385)\n+ Add query filter: latest by priority\n+ Add DNF_NO_PROTECTED flag to allow empty list of protected packages\n+ Remove \u0027dim\u0027 option from terminal colors to make them more readable (rh#1807774, rh#1814563)\n+ [context] Error when main config file can\u0027t be opened (rh#1794864)\n+ [context] Add function function dnf_context_is_set_config_file_path\n+ swdb: Catch only SQLite3 exceptions and simplify the messages\n+ MergedTransaction list multiple comments (rh#1773679)\n+ Modify CMake to pull *.po files from weblate\n+ Optimize DependencyContainer creation from an existing queue\n+ fix a memory leak in dnf_package_get_requires()\n+ Fix memory leaks on g_build_filename()\n+ Fix memory leak in dnf_context_setup()\n+ Add `hy_goal_favor` and `hy_goal_disfavor`\n+ Define a cleanup function for `DnfPackageSet`\n+ dnf-repo: fix dnf_repo_get_public_keys double-free\n+ Do not cache RPMDB\n+ Use single-quotes around string literals used in SQL statements\n+ SQLite3: Do not close the database if it wasn\u0027t opened (rh#1761976)\n+ Don\u0027t create a new history DB connection for in-memory DB\n+ transaction/Swdb: Use a single logger variable in constructor\n+ utils: Add a safe version of pathExists()\n+ swdb: Handle the case when pathExists() fails on e.g. permission\n+ Repo: prepend \u0027file://\u0027 if a local path is used as baseurl\n+ Move urlEncode() to utils\n+ utils: Add \u0027exclude\u0027 argument to urlEncode()\n+ Encode package URL for downloading through librepo (rh#1817130)\n+ Replace std::runtime_error with libdnf::RepoError\n+ Fixes and error handling improvements of the File class\n+ [context] Use ConfigRepo for gpgkey and baseurl (rh#1807864)\n+ [context] support \u0027priority\u0027 option in .repo config file (rh#1797265)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2021-2685",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2021_2685-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2021:2685-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUJW4L55UGKEL4ROYV7WZNQDNBJXXLLG/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2021:2685-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/PUJW4L55UGKEL4ROYV7WZNQDNBJXXLLG/"
},
{
"category": "self",
"summary": "SUSE Bug 1183779",
"url": "https://bugzilla.suse.com/1183779"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20271 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3421 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3421/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3445 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3445/"
}
],
"title": "Security update for libdnf",
"tracking": {
"current_release_date": "2021-08-13T09:21:40Z",
"generator": {
"date": "2021-08-13T09:21:40Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2021:2685-1",
"initial_release_date": "2021-08-13T09:21:40Z",
"revision_history": [
{
"date": "2021-08-13T09:21:40Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libdnf-devel-0.62.0-5.3.1.aarch64",
"product": {
"name": "libdnf-devel-0.62.0-5.3.1.aarch64",
"product_id": "libdnf-devel-0.62.0-5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"product": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"product_id": "libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libdnf2-0.62.0-5.3.1.aarch64",
"product": {
"name": "libdnf2-0.62.0-5.3.1.aarch64",
"product_id": "libdnf2-0.62.0-5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-hawkey-0.62.0-5.3.1.aarch64",
"product": {
"name": "python3-hawkey-0.62.0-5.3.1.aarch64",
"product_id": "python3-hawkey-0.62.0-5.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-libdnf-0.62.0-5.3.1.aarch64",
"product": {
"name": "python3-libdnf-0.62.0-5.3.1.aarch64",
"product_id": "python3-libdnf-0.62.0-5.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libdnf-devel-0.62.0-5.3.1.i586",
"product": {
"name": "libdnf-devel-0.62.0-5.3.1.i586",
"product_id": "libdnf-devel-0.62.0-5.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"product": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"product_id": "libdnf-repo-config-zypp-0.62.0-5.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdnf2-0.62.0-5.3.1.i586",
"product": {
"name": "libdnf2-0.62.0-5.3.1.i586",
"product_id": "libdnf2-0.62.0-5.3.1.i586"
}
},
{
"category": "product_version",
"name": "python3-hawkey-0.62.0-5.3.1.i586",
"product": {
"name": "python3-hawkey-0.62.0-5.3.1.i586",
"product_id": "python3-hawkey-0.62.0-5.3.1.i586"
}
},
{
"category": "product_version",
"name": "python3-libdnf-0.62.0-5.3.1.i586",
"product": {
"name": "python3-libdnf-0.62.0-5.3.1.i586",
"product_id": "python3-libdnf-0.62.0-5.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "hawkey-man-0.62.0-5.3.1.noarch",
"product": {
"name": "hawkey-man-0.62.0-5.3.1.noarch",
"product_id": "hawkey-man-0.62.0-5.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libdnf-devel-0.62.0-5.3.1.ppc64le",
"product": {
"name": "libdnf-devel-0.62.0-5.3.1.ppc64le",
"product_id": "libdnf-devel-0.62.0-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"product": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"product_id": "libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libdnf2-0.62.0-5.3.1.ppc64le",
"product": {
"name": "libdnf2-0.62.0-5.3.1.ppc64le",
"product_id": "libdnf2-0.62.0-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-hawkey-0.62.0-5.3.1.ppc64le",
"product": {
"name": "python3-hawkey-0.62.0-5.3.1.ppc64le",
"product_id": "python3-hawkey-0.62.0-5.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-libdnf-0.62.0-5.3.1.ppc64le",
"product": {
"name": "python3-libdnf-0.62.0-5.3.1.ppc64le",
"product_id": "python3-libdnf-0.62.0-5.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libdnf-devel-0.62.0-5.3.1.s390x",
"product": {
"name": "libdnf-devel-0.62.0-5.3.1.s390x",
"product_id": "libdnf-devel-0.62.0-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"product": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"product_id": "libdnf-repo-config-zypp-0.62.0-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libdnf2-0.62.0-5.3.1.s390x",
"product": {
"name": "libdnf2-0.62.0-5.3.1.s390x",
"product_id": "libdnf2-0.62.0-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-hawkey-0.62.0-5.3.1.s390x",
"product": {
"name": "python3-hawkey-0.62.0-5.3.1.s390x",
"product_id": "python3-hawkey-0.62.0-5.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-libdnf-0.62.0-5.3.1.s390x",
"product": {
"name": "python3-libdnf-0.62.0-5.3.1.s390x",
"product_id": "python3-libdnf-0.62.0-5.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libdnf-devel-0.62.0-5.3.1.x86_64",
"product": {
"name": "libdnf-devel-0.62.0-5.3.1.x86_64",
"product_id": "libdnf-devel-0.62.0-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"product": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"product_id": "libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdnf2-0.62.0-5.3.1.x86_64",
"product": {
"name": "libdnf2-0.62.0-5.3.1.x86_64",
"product_id": "libdnf2-0.62.0-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-hawkey-0.62.0-5.3.1.x86_64",
"product": {
"name": "python3-hawkey-0.62.0-5.3.1.x86_64",
"product_id": "python3-hawkey-0.62.0-5.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-libdnf-0.62.0-5.3.1.x86_64",
"product": {
"name": "python3-libdnf-0.62.0-5.3.1.x86_64",
"product_id": "python3-libdnf-0.62.0-5.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "hawkey-man-0.62.0-5.3.1.noarch as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch"
},
"product_reference": "hawkey-man-0.62.0-5.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-devel-0.62.0-5.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64"
},
"product_reference": "libdnf-devel-0.62.0-5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-devel-0.62.0-5.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586"
},
"product_reference": "libdnf-devel-0.62.0-5.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-devel-0.62.0-5.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le"
},
"product_reference": "libdnf-devel-0.62.0-5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-devel-0.62.0-5.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x"
},
"product_reference": "libdnf-devel-0.62.0-5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-devel-0.62.0-5.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64"
},
"product_reference": "libdnf-devel-0.62.0-5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64"
},
"product_reference": "libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586"
},
"product_reference": "libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le"
},
"product_reference": "libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x"
},
"product_reference": "libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64"
},
"product_reference": "libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf2-0.62.0-5.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64"
},
"product_reference": "libdnf2-0.62.0-5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf2-0.62.0-5.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586"
},
"product_reference": "libdnf2-0.62.0-5.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf2-0.62.0-5.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le"
},
"product_reference": "libdnf2-0.62.0-5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf2-0.62.0-5.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x"
},
"product_reference": "libdnf2-0.62.0-5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdnf2-0.62.0-5.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64"
},
"product_reference": "libdnf2-0.62.0-5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-hawkey-0.62.0-5.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64"
},
"product_reference": "python3-hawkey-0.62.0-5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-hawkey-0.62.0-5.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586"
},
"product_reference": "python3-hawkey-0.62.0-5.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-hawkey-0.62.0-5.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le"
},
"product_reference": "python3-hawkey-0.62.0-5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-hawkey-0.62.0-5.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x"
},
"product_reference": "python3-hawkey-0.62.0-5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-hawkey-0.62.0-5.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64"
},
"product_reference": "python3-hawkey-0.62.0-5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libdnf-0.62.0-5.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64"
},
"product_reference": "python3-libdnf-0.62.0-5.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libdnf-0.62.0-5.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586"
},
"product_reference": "python3-libdnf-0.62.0-5.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libdnf-0.62.0-5.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le"
},
"product_reference": "python3-libdnf-0.62.0-5.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libdnf-0.62.0-5.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x"
},
"product_reference": "python3-libdnf-0.62.0-5.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libdnf-0.62.0-5.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
},
"product_reference": "python3-libdnf-0.62.0-5.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20271"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20271",
"url": "https://www.suse.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "SUSE Bug 1183545 for CVE-2021-20271",
"url": "https://bugzilla.suse.com/1183545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-13T09:21:40Z",
"details": "low"
}
],
"title": "CVE-2021-20271"
},
{
"cve": "CVE-2021-3421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3421"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3421",
"url": "https://www.suse.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "SUSE Bug 1183543 for CVE-2021-3421",
"url": "https://bugzilla.suse.com/1183543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-13T09:21:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-3421"
},
{
"cve": "CVE-2021-3445",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3445"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libdnf\u0027s signature verification functionality in versions before 0.60.1. This flaw allows an attacker to achieve code execution if they can alter the header information of an RPM package and then trick a user or system into installing it. The highest risk of this vulnerability is to confidentiality, integrity, as well as system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3445",
"url": "https://www.suse.com/security/cve/CVE-2021-3445"
},
{
"category": "external",
"summary": "SUSE Bug 1183779 for CVE-2021-3445",
"url": "https://bugzilla.suse.com/1183779"
},
{
"category": "external",
"summary": "SUSE Bug 1184501 for CVE-2021-3445",
"url": "https://bugzilla.suse.com/1184501"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:hawkey-man-0.62.0-5.3.1.noarch",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-devel-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf-repo-config-zypp-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:libdnf2-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-hawkey-0.62.0-5.3.1.x86_64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.aarch64",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.i586",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.ppc64le",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.s390x",
"openSUSE Leap 15.3:python3-libdnf-0.62.0-5.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-13T09:21:40Z",
"details": "moderate"
}
],
"title": "CVE-2021-3445"
}
]
}
OPENSUSE-SU-2024:11305-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "librpmbuild9-4.16.1.3-3.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the librpmbuild9-4.16.1.3-3.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11305",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11305-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-7500 page",
"url": "https://www.suse.com/security/cve/CVE-2017-7500/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3421 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3421/"
}
],
"title": "librpmbuild9-4.16.1.3-3.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11305-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "librpmbuild9-4.16.1.3-3.2.aarch64",
"product": {
"name": "librpmbuild9-4.16.1.3-3.2.aarch64",
"product_id": "librpmbuild9-4.16.1.3-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-4.16.1.3-3.2.aarch64",
"product": {
"name": "rpm-4.16.1.3-3.2.aarch64",
"product_id": "rpm-4.16.1.3-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.16.1.3-3.2.aarch64",
"product": {
"name": "rpm-32bit-4.16.1.3-3.2.aarch64",
"product_id": "rpm-32bit-4.16.1.3-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.16.1.3-3.2.aarch64",
"product": {
"name": "rpm-build-4.16.1.3-3.2.aarch64",
"product_id": "rpm-build-4.16.1.3-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-build-perl-4.16.1.3-3.2.aarch64",
"product": {
"name": "rpm-build-perl-4.16.1.3-3.2.aarch64",
"product_id": "rpm-build-perl-4.16.1.3-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-build-python-4.16.1.3-3.2.aarch64",
"product": {
"name": "rpm-build-python-4.16.1.3-3.2.aarch64",
"product_id": "rpm-build-python-4.16.1.3-3.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.16.1.3-3.2.aarch64",
"product": {
"name": "rpm-devel-4.16.1.3-3.2.aarch64",
"product_id": "rpm-devel-4.16.1.3-3.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "librpmbuild9-4.16.1.3-3.2.ppc64le",
"product": {
"name": "librpmbuild9-4.16.1.3-3.2.ppc64le",
"product_id": "librpmbuild9-4.16.1.3-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-4.16.1.3-3.2.ppc64le",
"product": {
"name": "rpm-4.16.1.3-3.2.ppc64le",
"product_id": "rpm-4.16.1.3-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.16.1.3-3.2.ppc64le",
"product": {
"name": "rpm-32bit-4.16.1.3-3.2.ppc64le",
"product_id": "rpm-32bit-4.16.1.3-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-build-4.16.1.3-3.2.ppc64le",
"product": {
"name": "rpm-build-4.16.1.3-3.2.ppc64le",
"product_id": "rpm-build-4.16.1.3-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-build-perl-4.16.1.3-3.2.ppc64le",
"product": {
"name": "rpm-build-perl-4.16.1.3-3.2.ppc64le",
"product_id": "rpm-build-perl-4.16.1.3-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-build-python-4.16.1.3-3.2.ppc64le",
"product": {
"name": "rpm-build-python-4.16.1.3-3.2.ppc64le",
"product_id": "rpm-build-python-4.16.1.3-3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.16.1.3-3.2.ppc64le",
"product": {
"name": "rpm-devel-4.16.1.3-3.2.ppc64le",
"product_id": "rpm-devel-4.16.1.3-3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "librpmbuild9-4.16.1.3-3.2.s390x",
"product": {
"name": "librpmbuild9-4.16.1.3-3.2.s390x",
"product_id": "librpmbuild9-4.16.1.3-3.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-4.16.1.3-3.2.s390x",
"product": {
"name": "rpm-4.16.1.3-3.2.s390x",
"product_id": "rpm-4.16.1.3-3.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.16.1.3-3.2.s390x",
"product": {
"name": "rpm-32bit-4.16.1.3-3.2.s390x",
"product_id": "rpm-32bit-4.16.1.3-3.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-build-4.16.1.3-3.2.s390x",
"product": {
"name": "rpm-build-4.16.1.3-3.2.s390x",
"product_id": "rpm-build-4.16.1.3-3.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-build-perl-4.16.1.3-3.2.s390x",
"product": {
"name": "rpm-build-perl-4.16.1.3-3.2.s390x",
"product_id": "rpm-build-perl-4.16.1.3-3.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-build-python-4.16.1.3-3.2.s390x",
"product": {
"name": "rpm-build-python-4.16.1.3-3.2.s390x",
"product_id": "rpm-build-python-4.16.1.3-3.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.16.1.3-3.2.s390x",
"product": {
"name": "rpm-devel-4.16.1.3-3.2.s390x",
"product_id": "rpm-devel-4.16.1.3-3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "librpmbuild9-4.16.1.3-3.2.x86_64",
"product": {
"name": "librpmbuild9-4.16.1.3-3.2.x86_64",
"product_id": "librpmbuild9-4.16.1.3-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-4.16.1.3-3.2.x86_64",
"product": {
"name": "rpm-4.16.1.3-3.2.x86_64",
"product_id": "rpm-4.16.1.3-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.16.1.3-3.2.x86_64",
"product": {
"name": "rpm-32bit-4.16.1.3-3.2.x86_64",
"product_id": "rpm-32bit-4.16.1.3-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.16.1.3-3.2.x86_64",
"product": {
"name": "rpm-build-4.16.1.3-3.2.x86_64",
"product_id": "rpm-build-4.16.1.3-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-build-perl-4.16.1.3-3.2.x86_64",
"product": {
"name": "rpm-build-perl-4.16.1.3-3.2.x86_64",
"product_id": "rpm-build-perl-4.16.1.3-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-build-python-4.16.1.3-3.2.x86_64",
"product": {
"name": "rpm-build-python-4.16.1.3-3.2.x86_64",
"product_id": "rpm-build-python-4.16.1.3-3.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.16.1.3-3.2.x86_64",
"product": {
"name": "rpm-devel-4.16.1.3-3.2.x86_64",
"product_id": "rpm-devel-4.16.1.3-3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "librpmbuild9-4.16.1.3-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.aarch64"
},
"product_reference": "librpmbuild9-4.16.1.3-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librpmbuild9-4.16.1.3-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.ppc64le"
},
"product_reference": "librpmbuild9-4.16.1.3-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librpmbuild9-4.16.1.3-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.s390x"
},
"product_reference": "librpmbuild9-4.16.1.3-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librpmbuild9-4.16.1.3-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.x86_64"
},
"product_reference": "librpmbuild9-4.16.1.3-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.16.1.3-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-4.16.1.3-3.2.aarch64"
},
"product_reference": "rpm-4.16.1.3-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.16.1.3-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-4.16.1.3-3.2.ppc64le"
},
"product_reference": "rpm-4.16.1.3-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.16.1.3-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-4.16.1.3-3.2.s390x"
},
"product_reference": "rpm-4.16.1.3-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.16.1.3-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-4.16.1.3-3.2.x86_64"
},
"product_reference": "rpm-4.16.1.3-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.16.1.3-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.aarch64"
},
"product_reference": "rpm-32bit-4.16.1.3-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.16.1.3-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.ppc64le"
},
"product_reference": "rpm-32bit-4.16.1.3-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.16.1.3-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.s390x"
},
"product_reference": "rpm-32bit-4.16.1.3-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.16.1.3-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.x86_64"
},
"product_reference": "rpm-32bit-4.16.1.3-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.16.1.3-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.aarch64"
},
"product_reference": "rpm-build-4.16.1.3-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.16.1.3-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.ppc64le"
},
"product_reference": "rpm-build-4.16.1.3-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.16.1.3-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.s390x"
},
"product_reference": "rpm-build-4.16.1.3-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.16.1.3-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.x86_64"
},
"product_reference": "rpm-build-4.16.1.3-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-perl-4.16.1.3-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.aarch64"
},
"product_reference": "rpm-build-perl-4.16.1.3-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-perl-4.16.1.3-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.ppc64le"
},
"product_reference": "rpm-build-perl-4.16.1.3-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-perl-4.16.1.3-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.s390x"
},
"product_reference": "rpm-build-perl-4.16.1.3-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-perl-4.16.1.3-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.x86_64"
},
"product_reference": "rpm-build-perl-4.16.1.3-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-python-4.16.1.3-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.aarch64"
},
"product_reference": "rpm-build-python-4.16.1.3-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-python-4.16.1.3-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.ppc64le"
},
"product_reference": "rpm-build-python-4.16.1.3-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-python-4.16.1.3-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.s390x"
},
"product_reference": "rpm-build-python-4.16.1.3-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-python-4.16.1.3-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.x86_64"
},
"product_reference": "rpm-build-python-4.16.1.3-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.16.1.3-3.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.aarch64"
},
"product_reference": "rpm-devel-4.16.1.3-3.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.16.1.3-3.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.ppc64le"
},
"product_reference": "rpm-devel-4.16.1.3-3.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.16.1.3-3.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.s390x"
},
"product_reference": "rpm-devel-4.16.1.3-3.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.16.1.3-3.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.x86_64"
},
"product_reference": "rpm-devel-4.16.1.3-3.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-7500",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-7500"
}
],
"notes": [
{
"category": "general",
"text": "It was found that rpm did not properly handle RPM installations when a destination path was a symbolic link to a directory, possibly changing ownership and permissions of an arbitrary directory, and RPM files being placed in an arbitrary destination. An attacker, with write access to a directory in which a subdirectory will be installed, could redirect that directory to an arbitrary location and gain root privilege.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-7500",
"url": "https://www.suse.com/security/cve/CVE-2017-7500"
},
{
"category": "external",
"summary": "SUSE Bug 1126909 for CVE-2017-7500",
"url": "https://bugzilla.suse.com/1126909"
},
{
"category": "external",
"summary": "SUSE Bug 1135195 for CVE-2017-7500",
"url": "https://bugzilla.suse.com/1135195"
},
{
"category": "external",
"summary": "SUSE Bug 1157882 for CVE-2017-7500",
"url": "https://bugzilla.suse.com/1157882"
},
{
"category": "external",
"summary": "SUSE Bug 1157883 for CVE-2017-7500",
"url": "https://bugzilla.suse.com/1157883"
},
{
"category": "external",
"summary": "SUSE Bug 943457 for CVE-2017-7500",
"url": "https://bugzilla.suse.com/943457"
},
{
"category": "external",
"summary": "SUSE Bug 964063 for CVE-2017-7500",
"url": "https://bugzilla.suse.com/964063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2017-7500"
},
{
"cve": "CVE-2021-3421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3421"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3421",
"url": "https://www.suse.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "SUSE Bug 1183543 for CVE-2021-3421",
"url": "https://bugzilla.suse.com/1183543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:librpmbuild9-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-32bit-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-perl-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-build-python-4.16.1.3-3.2.x86_64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.aarch64",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.ppc64le",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.s390x",
"openSUSE Tumbleweed:rpm-devel-4.16.1.3-3.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2021-3421"
}
]
}
SUSE-SU-2022:3939-1
Vulnerability from csaf_suse - Published: 2022-11-10 13:32 - Updated: 2022-11-10 13:32Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rpm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rpm fixes the following issues:\n\n- Fixed PGP parsing bugs (bsc#1185299).\n- Fixed various format handling bugs (bsc#996280).\n- CVE-2021-3421: Fixed vulnerability where unsigned headers could be injected into the rpm database (bsc#1183543). \n- CVE-2021-20271: Fixed vulnerability where a corrupted rpm could corrupt the rpm database (bsc#1183545).\n- CVE-2021-20266: Fixed missing bounds check in hdrblobInit (bsc#1183632).\n\nBugfixes:\n\n- Fixed deadlock when multiple rpm processes tried to acquire the database lock (bsc#1183659).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2022-3939,SUSE-SLE-SDK-12-SP5-2022-3939,SUSE-SLE-SERVER-12-SP5-2022-3939",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2022_3939-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2022:3939-1",
"url": "https://www.suse.com/support/update/announcement/2022/suse-su-20223939-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2022:3939-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2022-November/012871.html"
},
{
"category": "self",
"summary": "SUSE Bug 1183543",
"url": "https://bugzilla.suse.com/1183543"
},
{
"category": "self",
"summary": "SUSE Bug 1183545",
"url": "https://bugzilla.suse.com/1183545"
},
{
"category": "self",
"summary": "SUSE Bug 1183632",
"url": "https://bugzilla.suse.com/1183632"
},
{
"category": "self",
"summary": "SUSE Bug 1183659",
"url": "https://bugzilla.suse.com/1183659"
},
{
"category": "self",
"summary": "SUSE Bug 1185299",
"url": "https://bugzilla.suse.com/1185299"
},
{
"category": "self",
"summary": "SUSE Bug 996280",
"url": "https://bugzilla.suse.com/996280"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20266 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20271 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3421 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3421/"
}
],
"title": "Security update for rpm",
"tracking": {
"current_release_date": "2022-11-10T13:32:14Z",
"generator": {
"date": "2022-11-10T13:32:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2022:3939-1",
"initial_release_date": "2022-11-10T13:32:14Z",
"revision_history": [
{
"date": "2022-11-10T13:32:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python3-rpm-4.11.2-16.26.1.aarch64",
"product": {
"name": "python3-rpm-4.11.2-16.26.1.aarch64",
"product_id": "python3-rpm-4.11.2-16.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-4.11.2-16.26.1.aarch64",
"product": {
"name": "rpm-4.11.2-16.26.1.aarch64",
"product_id": "rpm-4.11.2-16.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.11.2-16.26.1.aarch64",
"product": {
"name": "rpm-build-4.11.2-16.26.1.aarch64",
"product_id": "rpm-build-4.11.2-16.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.11.2-16.26.1.aarch64",
"product": {
"name": "rpm-devel-4.11.2-16.26.1.aarch64",
"product_id": "rpm-devel-4.11.2-16.26.1.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-python-4.11.2-16.26.1.aarch64",
"product": {
"name": "rpm-python-4.11.2-16.26.1.aarch64",
"product_id": "rpm-python-4.11.2-16.26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-64bit-4.11.2-16.26.1.aarch64_ilp32",
"product": {
"name": "rpm-64bit-4.11.2-16.26.1.aarch64_ilp32",
"product_id": "rpm-64bit-4.11.2-16.26.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-rpm-4.11.2-16.26.1.i586",
"product": {
"name": "python3-rpm-4.11.2-16.26.1.i586",
"product_id": "python3-rpm-4.11.2-16.26.1.i586"
}
},
{
"category": "product_version",
"name": "rpm-4.11.2-16.26.1.i586",
"product": {
"name": "rpm-4.11.2-16.26.1.i586",
"product_id": "rpm-4.11.2-16.26.1.i586"
}
},
{
"category": "product_version",
"name": "rpm-build-4.11.2-16.26.1.i586",
"product": {
"name": "rpm-build-4.11.2-16.26.1.i586",
"product_id": "rpm-build-4.11.2-16.26.1.i586"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.11.2-16.26.1.i586",
"product": {
"name": "rpm-devel-4.11.2-16.26.1.i586",
"product_id": "rpm-devel-4.11.2-16.26.1.i586"
}
},
{
"category": "product_version",
"name": "rpm-python-4.11.2-16.26.1.i586",
"product": {
"name": "rpm-python-4.11.2-16.26.1.i586",
"product_id": "rpm-python-4.11.2-16.26.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-rpm-4.11.2-16.26.1.ppc64le",
"product": {
"name": "python3-rpm-4.11.2-16.26.1.ppc64le",
"product_id": "python3-rpm-4.11.2-16.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-4.11.2-16.26.1.ppc64le",
"product": {
"name": "rpm-4.11.2-16.26.1.ppc64le",
"product_id": "rpm-4.11.2-16.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-build-4.11.2-16.26.1.ppc64le",
"product": {
"name": "rpm-build-4.11.2-16.26.1.ppc64le",
"product_id": "rpm-build-4.11.2-16.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.11.2-16.26.1.ppc64le",
"product": {
"name": "rpm-devel-4.11.2-16.26.1.ppc64le",
"product_id": "rpm-devel-4.11.2-16.26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-python-4.11.2-16.26.1.ppc64le",
"product": {
"name": "rpm-python-4.11.2-16.26.1.ppc64le",
"product_id": "rpm-python-4.11.2-16.26.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-rpm-4.11.2-16.26.1.s390",
"product": {
"name": "python3-rpm-4.11.2-16.26.1.s390",
"product_id": "python3-rpm-4.11.2-16.26.1.s390"
}
},
{
"category": "product_version",
"name": "rpm-4.11.2-16.26.1.s390",
"product": {
"name": "rpm-4.11.2-16.26.1.s390",
"product_id": "rpm-4.11.2-16.26.1.s390"
}
},
{
"category": "product_version",
"name": "rpm-build-4.11.2-16.26.1.s390",
"product": {
"name": "rpm-build-4.11.2-16.26.1.s390",
"product_id": "rpm-build-4.11.2-16.26.1.s390"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.11.2-16.26.1.s390",
"product": {
"name": "rpm-devel-4.11.2-16.26.1.s390",
"product_id": "rpm-devel-4.11.2-16.26.1.s390"
}
},
{
"category": "product_version",
"name": "rpm-python-4.11.2-16.26.1.s390",
"product": {
"name": "rpm-python-4.11.2-16.26.1.s390",
"product_id": "rpm-python-4.11.2-16.26.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-rpm-4.11.2-16.26.1.s390x",
"product": {
"name": "python3-rpm-4.11.2-16.26.1.s390x",
"product_id": "python3-rpm-4.11.2-16.26.1.s390x"
}
},
{
"category": "product_version",
"name": "rpm-4.11.2-16.26.1.s390x",
"product": {
"name": "rpm-4.11.2-16.26.1.s390x",
"product_id": "rpm-4.11.2-16.26.1.s390x"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.11.2-16.26.1.s390x",
"product": {
"name": "rpm-32bit-4.11.2-16.26.1.s390x",
"product_id": "rpm-32bit-4.11.2-16.26.1.s390x"
}
},
{
"category": "product_version",
"name": "rpm-build-4.11.2-16.26.1.s390x",
"product": {
"name": "rpm-build-4.11.2-16.26.1.s390x",
"product_id": "rpm-build-4.11.2-16.26.1.s390x"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.11.2-16.26.1.s390x",
"product": {
"name": "rpm-devel-4.11.2-16.26.1.s390x",
"product_id": "rpm-devel-4.11.2-16.26.1.s390x"
}
},
{
"category": "product_version",
"name": "rpm-python-4.11.2-16.26.1.s390x",
"product": {
"name": "rpm-python-4.11.2-16.26.1.s390x",
"product_id": "rpm-python-4.11.2-16.26.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-rpm-4.11.2-16.26.1.x86_64",
"product": {
"name": "python3-rpm-4.11.2-16.26.1.x86_64",
"product_id": "python3-rpm-4.11.2-16.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-4.11.2-16.26.1.x86_64",
"product": {
"name": "rpm-4.11.2-16.26.1.x86_64",
"product_id": "rpm-4.11.2-16.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.11.2-16.26.1.x86_64",
"product": {
"name": "rpm-32bit-4.11.2-16.26.1.x86_64",
"product_id": "rpm-32bit-4.11.2-16.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.11.2-16.26.1.x86_64",
"product": {
"name": "rpm-build-4.11.2-16.26.1.x86_64",
"product_id": "rpm-build-4.11.2-16.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.11.2-16.26.1.x86_64",
"product": {
"name": "rpm-devel-4.11.2-16.26.1.x86_64",
"product_id": "rpm-devel-4.11.2-16.26.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-python-4.11.2-16.26.1.x86_64",
"product": {
"name": "rpm-python-4.11.2-16.26.1.x86_64",
"product_id": "rpm-python-4.11.2-16.26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.11.2-16.26.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64"
},
"product_reference": "rpm-devel-4.11.2-16.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.11.2-16.26.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le"
},
"product_reference": "rpm-devel-4.11.2-16.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x"
},
"product_reference": "rpm-devel-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
},
"product_reference": "rpm-devel-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.11.2-16.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64"
},
"product_reference": "python3-rpm-4.11.2-16.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.11.2-16.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le"
},
"product_reference": "python3-rpm-4.11.2-16.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x"
},
"product_reference": "python3-rpm-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64"
},
"product_reference": "python3-rpm-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.11.2-16.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64"
},
"product_reference": "rpm-4.11.2-16.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.11.2-16.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le"
},
"product_reference": "rpm-4.11.2-16.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x"
},
"product_reference": "rpm-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64"
},
"product_reference": "rpm-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x"
},
"product_reference": "rpm-32bit-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64"
},
"product_reference": "rpm-32bit-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.11.2-16.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64"
},
"product_reference": "rpm-build-4.11.2-16.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.11.2-16.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le"
},
"product_reference": "rpm-build-4.11.2-16.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x"
},
"product_reference": "rpm-build-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64"
},
"product_reference": "rpm-build-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-python-4.11.2-16.26.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64"
},
"product_reference": "rpm-python-4.11.2-16.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-python-4.11.2-16.26.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le"
},
"product_reference": "rpm-python-4.11.2-16.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-python-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x"
},
"product_reference": "rpm-python-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-python-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64"
},
"product_reference": "rpm-python-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.11.2-16.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64"
},
"product_reference": "python3-rpm-4.11.2-16.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.11.2-16.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le"
},
"product_reference": "python3-rpm-4.11.2-16.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x"
},
"product_reference": "python3-rpm-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64"
},
"product_reference": "python3-rpm-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.11.2-16.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64"
},
"product_reference": "rpm-4.11.2-16.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.11.2-16.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le"
},
"product_reference": "rpm-4.11.2-16.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x"
},
"product_reference": "rpm-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64"
},
"product_reference": "rpm-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x"
},
"product_reference": "rpm-32bit-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64"
},
"product_reference": "rpm-32bit-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.11.2-16.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64"
},
"product_reference": "rpm-build-4.11.2-16.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.11.2-16.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le"
},
"product_reference": "rpm-build-4.11.2-16.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x"
},
"product_reference": "rpm-build-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64"
},
"product_reference": "rpm-build-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-python-4.11.2-16.26.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64"
},
"product_reference": "rpm-python-4.11.2-16.26.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-python-4.11.2-16.26.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le"
},
"product_reference": "rpm-python-4.11.2-16.26.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-python-4.11.2-16.26.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x"
},
"product_reference": "rpm-python-4.11.2-16.26.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-python-4.11.2-16.26.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64"
},
"product_reference": "rpm-python-4.11.2-16.26.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20266"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20266",
"url": "https://www.suse.com/security/cve/CVE-2021-20266"
},
{
"category": "external",
"summary": "SUSE Bug 1183632 for CVE-2021-20266",
"url": "https://bugzilla.suse.com/1183632"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-10T13:32:14Z",
"details": "low"
}
],
"title": "CVE-2021-20266"
},
{
"cve": "CVE-2021-20271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20271"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20271",
"url": "https://www.suse.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "SUSE Bug 1183545 for CVE-2021-20271",
"url": "https://bugzilla.suse.com/1183545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-10T13:32:14Z",
"details": "low"
}
],
"title": "CVE-2021-20271"
},
{
"cve": "CVE-2021-3421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3421"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3421",
"url": "https://www.suse.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "SUSE Bug 1183543 for CVE-2021-3421",
"url": "https://bugzilla.suse.com/1183543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:python3-rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-32bit-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-build-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:rpm-python-4.11.2-16.26.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:rpm-devel-4.11.2-16.26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-11-10T13:32:14Z",
"details": "moderate"
}
],
"title": "CVE-2021-3421"
}
]
}
SUSE-SU-2021:3444-1
Vulnerability from csaf_suse - Published: 2021-10-15 07:03 - Updated: 2021-10-15 07:03Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rpm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rpm fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2021-3421, CVE-2021-20271, CVE-2021-20266: Multiple header check improvements (bsc#1183543, bsc#1183545, bsc#1183632)\n- PGP hardening changes (bsc#1185299)\n- Fixed potential access of freed mem in ndb\u0027s glue code (bsc#1179416)\n\nMaintaince issues fixed:\n\n- Fixed zstd detection (bsc#1187670)\n- Added ndb rofs support (bsc#1188548)\n- Fixed deadlock when multiple rpm processes try tp acquire the database lock (bsc#1183659)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-3444,SUSE-SLE-Module-Basesystem-15-SP2-2021-3444,SUSE-SLE-Module-Development-Tools-15-SP2-2021-3444,SUSE-SLE-Module-Public-Cloud-15-SP2-2021-3444,SUSE-SLE-Module-Python2-15-SP2-2021-3444,SUSE-SLE-Module-SUSE-Manager-Proxy-4.1-2021-3444,SUSE-SLE-Module-SUSE-Manager-Server-4.1-2021-3444,SUSE-SUSE-MicroOS-5.0-2021-3444",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_3444-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:3444-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20213444-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:3444-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-October/009598.html"
},
{
"category": "self",
"summary": "SUSE Bug 1179416",
"url": "https://bugzilla.suse.com/1179416"
},
{
"category": "self",
"summary": "SUSE Bug 1183543",
"url": "https://bugzilla.suse.com/1183543"
},
{
"category": "self",
"summary": "SUSE Bug 1183545",
"url": "https://bugzilla.suse.com/1183545"
},
{
"category": "self",
"summary": "SUSE Bug 1183632",
"url": "https://bugzilla.suse.com/1183632"
},
{
"category": "self",
"summary": "SUSE Bug 1183659",
"url": "https://bugzilla.suse.com/1183659"
},
{
"category": "self",
"summary": "SUSE Bug 1185299",
"url": "https://bugzilla.suse.com/1185299"
},
{
"category": "self",
"summary": "SUSE Bug 1187670",
"url": "https://bugzilla.suse.com/1187670"
},
{
"category": "self",
"summary": "SUSE Bug 1188548",
"url": "https://bugzilla.suse.com/1188548"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20266 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20271 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3421 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3421/"
}
],
"title": "Security update for rpm",
"tracking": {
"current_release_date": "2021-10-15T07:03:27Z",
"generator": {
"date": "2021-10-15T07:03:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:3444-1",
"initial_release_date": "2021-10-15T07:03:27Z",
"revision_history": [
{
"date": "2021-10-15T07:03:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.1-22.4.1.aarch64",
"product": {
"name": "python2-rpm-4.14.1-22.4.1.aarch64",
"product_id": "python2-rpm-4.14.1-22.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.1-22.4.1.aarch64",
"product": {
"name": "python3-rpm-4.14.1-22.4.1.aarch64",
"product_id": "python3-rpm-4.14.1-22.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-4.14.1-22.4.2.aarch64",
"product": {
"name": "rpm-4.14.1-22.4.2.aarch64",
"product_id": "rpm-4.14.1-22.4.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.1-22.4.2.aarch64",
"product": {
"name": "rpm-build-4.14.1-22.4.2.aarch64",
"product_id": "rpm-build-4.14.1-22.4.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.1-22.4.2.aarch64",
"product": {
"name": "rpm-devel-4.14.1-22.4.2.aarch64",
"product_id": "rpm-devel-4.14.1-22.4.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.1-22.4.2.aarch64",
"product": {
"name": "rpm-ndb-4.14.1-22.4.2.aarch64",
"product_id": "rpm-ndb-4.14.1-22.4.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-64bit-4.14.1-22.4.2.aarch64_ilp32",
"product": {
"name": "rpm-64bit-4.14.1-22.4.2.aarch64_ilp32",
"product_id": "rpm-64bit-4.14.1-22.4.2.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "rpm-ndb-64bit-4.14.1-22.4.2.aarch64_ilp32",
"product": {
"name": "rpm-ndb-64bit-4.14.1-22.4.2.aarch64_ilp32",
"product_id": "rpm-ndb-64bit-4.14.1-22.4.2.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.1-22.4.1.i586",
"product": {
"name": "python2-rpm-4.14.1-22.4.1.i586",
"product_id": "python2-rpm-4.14.1-22.4.1.i586"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.1-22.4.1.i586",
"product": {
"name": "python3-rpm-4.14.1-22.4.1.i586",
"product_id": "python3-rpm-4.14.1-22.4.1.i586"
}
},
{
"category": "product_version",
"name": "rpm-4.14.1-22.4.2.i586",
"product": {
"name": "rpm-4.14.1-22.4.2.i586",
"product_id": "rpm-4.14.1-22.4.2.i586"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.1-22.4.2.i586",
"product": {
"name": "rpm-build-4.14.1-22.4.2.i586",
"product_id": "rpm-build-4.14.1-22.4.2.i586"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.1-22.4.2.i586",
"product": {
"name": "rpm-devel-4.14.1-22.4.2.i586",
"product_id": "rpm-devel-4.14.1-22.4.2.i586"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.1-22.4.2.i586",
"product": {
"name": "rpm-ndb-4.14.1-22.4.2.i586",
"product_id": "rpm-ndb-4.14.1-22.4.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.1-22.4.1.ppc64le",
"product": {
"name": "python2-rpm-4.14.1-22.4.1.ppc64le",
"product_id": "python2-rpm-4.14.1-22.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.1-22.4.1.ppc64le",
"product": {
"name": "python3-rpm-4.14.1-22.4.1.ppc64le",
"product_id": "python3-rpm-4.14.1-22.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-4.14.1-22.4.2.ppc64le",
"product": {
"name": "rpm-4.14.1-22.4.2.ppc64le",
"product_id": "rpm-4.14.1-22.4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.1-22.4.2.ppc64le",
"product": {
"name": "rpm-build-4.14.1-22.4.2.ppc64le",
"product_id": "rpm-build-4.14.1-22.4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.1-22.4.2.ppc64le",
"product": {
"name": "rpm-devel-4.14.1-22.4.2.ppc64le",
"product_id": "rpm-devel-4.14.1-22.4.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.1-22.4.2.ppc64le",
"product": {
"name": "rpm-ndb-4.14.1-22.4.2.ppc64le",
"product_id": "rpm-ndb-4.14.1-22.4.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.1-22.4.1.s390x",
"product": {
"name": "python2-rpm-4.14.1-22.4.1.s390x",
"product_id": "python2-rpm-4.14.1-22.4.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.1-22.4.1.s390x",
"product": {
"name": "python3-rpm-4.14.1-22.4.1.s390x",
"product_id": "python3-rpm-4.14.1-22.4.1.s390x"
}
},
{
"category": "product_version",
"name": "rpm-4.14.1-22.4.2.s390x",
"product": {
"name": "rpm-4.14.1-22.4.2.s390x",
"product_id": "rpm-4.14.1-22.4.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.1-22.4.2.s390x",
"product": {
"name": "rpm-build-4.14.1-22.4.2.s390x",
"product_id": "rpm-build-4.14.1-22.4.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.1-22.4.2.s390x",
"product": {
"name": "rpm-devel-4.14.1-22.4.2.s390x",
"product_id": "rpm-devel-4.14.1-22.4.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.1-22.4.2.s390x",
"product": {
"name": "rpm-ndb-4.14.1-22.4.2.s390x",
"product_id": "rpm-ndb-4.14.1-22.4.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.1-22.4.1.x86_64",
"product": {
"name": "python2-rpm-4.14.1-22.4.1.x86_64",
"product_id": "python2-rpm-4.14.1-22.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.1-22.4.1.x86_64",
"product": {
"name": "python3-rpm-4.14.1-22.4.1.x86_64",
"product_id": "python3-rpm-4.14.1-22.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-4.14.1-22.4.2.x86_64",
"product": {
"name": "rpm-4.14.1-22.4.2.x86_64",
"product_id": "rpm-4.14.1-22.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.14.1-22.4.2.x86_64",
"product": {
"name": "rpm-32bit-4.14.1-22.4.2.x86_64",
"product_id": "rpm-32bit-4.14.1-22.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.1-22.4.2.x86_64",
"product": {
"name": "rpm-build-4.14.1-22.4.2.x86_64",
"product_id": "rpm-build-4.14.1-22.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.1-22.4.2.x86_64",
"product": {
"name": "rpm-devel-4.14.1-22.4.2.x86_64",
"product_id": "rpm-devel-4.14.1-22.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.1-22.4.2.x86_64",
"product": {
"name": "rpm-ndb-4.14.1-22.4.2.x86_64",
"product_id": "rpm-ndb-4.14.1-22.4.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-ndb-32bit-4.14.1-22.4.2.x86_64",
"product": {
"name": "rpm-ndb-32bit-4.14.1-22.4.2.x86_64",
"product_id": "rpm-ndb-32bit-4.14.1-22.4.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 2 15 SP2",
"product": {
"name": "SUSE Linux Enterprise Module for Python 2 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python2:15:sp2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy Module 4.1",
"product": {
"name": "SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-proxy:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server Module 4.1",
"product": {
"name": "SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-server:4.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.0",
"product": {
"name": "SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.1-22.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64"
},
"product_reference": "python3-rpm-4.14.1-22.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.1-22.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le"
},
"product_reference": "python3-rpm-4.14.1-22.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.1-22.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x"
},
"product_reference": "python3-rpm-4.14.1-22.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.1-22.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64"
},
"product_reference": "python3-rpm-4.14.1-22.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.1-22.4.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64"
},
"product_reference": "rpm-4.14.1-22.4.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.1-22.4.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le"
},
"product_reference": "rpm-4.14.1-22.4.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.1-22.4.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x"
},
"product_reference": "rpm-4.14.1-22.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.1-22.4.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64"
},
"product_reference": "rpm-4.14.1-22.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.14.1-22.4.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64"
},
"product_reference": "rpm-32bit-4.14.1-22.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.1-22.4.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64"
},
"product_reference": "rpm-devel-4.14.1-22.4.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.1-22.4.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le"
},
"product_reference": "rpm-devel-4.14.1-22.4.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.1-22.4.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x"
},
"product_reference": "rpm-devel-4.14.1-22.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.1-22.4.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64"
},
"product_reference": "rpm-devel-4.14.1-22.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64"
},
"product_reference": "rpm-build-4.14.1-22.4.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le"
},
"product_reference": "rpm-build-4.14.1-22.4.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x"
},
"product_reference": "rpm-build-4.14.1-22.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64"
},
"product_reference": "rpm-build-4.14.1-22.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.1-22.4.2.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64"
},
"product_reference": "rpm-ndb-4.14.1-22.4.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.1-22.4.2.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le"
},
"product_reference": "rpm-ndb-4.14.1-22.4.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.1-22.4.2.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x"
},
"product_reference": "rpm-ndb-4.14.1-22.4.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.1-22.4.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64"
},
"product_reference": "rpm-ndb-4.14.1-22.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.1-22.4.1.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64"
},
"product_reference": "python2-rpm-4.14.1-22.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.1-22.4.1.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le"
},
"product_reference": "python2-rpm-4.14.1-22.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.1-22.4.1.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x"
},
"product_reference": "python2-rpm-4.14.1-22.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.1-22.4.1.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP2",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64"
},
"product_reference": "python2-rpm-4.14.1-22.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.aarch64 as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64"
},
"product_reference": "rpm-build-4.14.1-22.4.2.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.ppc64le as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le"
},
"product_reference": "rpm-build-4.14.1-22.4.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.s390x as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x"
},
"product_reference": "rpm-build-4.14.1-22.4.2.s390x",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.x86_64 as component of SUSE Manager Proxy Module 4.1",
"product_id": "SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
},
"product_reference": "rpm-build-4.14.1-22.4.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.aarch64 as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64"
},
"product_reference": "rpm-build-4.14.1-22.4.2.aarch64",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.ppc64le as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le"
},
"product_reference": "rpm-build-4.14.1-22.4.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.s390x as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x"
},
"product_reference": "rpm-build-4.14.1-22.4.2.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.1-22.4.2.x86_64 as component of SUSE Manager Server Module 4.1",
"product_id": "SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
},
"product_reference": "rpm-build-4.14.1-22.4.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.1-22.4.1.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64"
},
"product_reference": "python3-rpm-4.14.1-22.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.1-22.4.1.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64"
},
"product_reference": "python3-rpm-4.14.1-22.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.1-22.4.2.aarch64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64"
},
"product_reference": "rpm-4.14.1-22.4.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.1-22.4.2.x86_64 as component of SUSE Linux Enterprise Micro 5.0",
"product_id": "SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64"
},
"product_reference": "rpm-4.14.1-22.4.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20266"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20266",
"url": "https://www.suse.com/security/cve/CVE-2021-20266"
},
{
"category": "external",
"summary": "SUSE Bug 1183632 for CVE-2021-20266",
"url": "https://bugzilla.suse.com/1183632"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-15T07:03:27Z",
"details": "low"
}
],
"title": "CVE-2021-20266"
},
{
"cve": "CVE-2021-20271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20271"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20271",
"url": "https://www.suse.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "SUSE Bug 1183545 for CVE-2021-20271",
"url": "https://bugzilla.suse.com/1183545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-15T07:03:27Z",
"details": "low"
}
],
"title": "CVE-2021-20271"
},
{
"cve": "CVE-2021-3421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3421"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3421",
"url": "https://www.suse.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "SUSE Bug 1183543 for CVE-2021-3421",
"url": "https://bugzilla.suse.com/1183543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.0:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Micro 5.0:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:python3-rpm-4.14.1-22.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-32bit-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP2:rpm-devel-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP2:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP2:rpm-ndb-4.14.1-22.4.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP2:python2-rpm-4.14.1-22.4.1.x86_64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Proxy Module 4.1:rpm-build-4.14.1-22.4.2.x86_64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.aarch64",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.ppc64le",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.s390x",
"SUSE Manager Server Module 4.1:rpm-build-4.14.1-22.4.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-10-15T07:03:27Z",
"details": "moderate"
}
],
"title": "CVE-2021-3421"
}
]
}
SUSE-SU-2021:2682-1
Vulnerability from csaf_suse - Published: 2021-08-12 18:06 - Updated: 2021-08-12 18:06Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rpm",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rpm fixes the following issues:\n\n- Changed default package verification level to \u0027none\u0027 to be compatible to rpm-4.14.1\n- Made illegal obsoletes a warning\n- Fixed a potential access of freed mem in ndb\u0027s glue code (bsc#1179416)\n- Added support for enforcing signature policy and payload verification step to\n transactions (jsc#SLE-17817)\n- Added :humansi and :hmaniec query formatters for human readable output\n- Added query selectors for whatobsoletes and whatconflicts\n- Added support for sorting caret higher than base version\n- rpm does no longer require the signature header to be in a contiguous\n region when signing (bsc#1181805)\n\nSecurity fixes:\n\n- CVE-2021-3421: A flaw was found in the RPM package in the read functionality. This flaw allows an\n attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM\n repository, to cause RPM database corruption. The highest threat from this vulnerability is to\n data integrity (bsc#1183543)\n\n- CVE-2021-20271: A flaw was found in RPM\u0027s signature check functionality when reading a package file.\n This flaw allows an attacker who can convince a victim to install a seemingly verifiable package,\n whose signature header was modified, to cause RPM database corruption and execute code. The highest\n threat from this vulnerability is to data integrity, confidentiality, and system availability (bsc#1183545)\n\n- CVE-2021-20266: A flaw was found in RPM\u0027s hdrblobInit() in lib/header.c. This flaw allows an attacker\n who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability\n is to system availability.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2021-2682,SUSE-SLE-Module-Basesystem-15-SP3-2021-2682,SUSE-SLE-Module-Development-Tools-15-SP3-2021-2682,SUSE-SLE-Module-Public-Cloud-15-SP3-2021-2682,SUSE-SLE-Module-Python2-15-SP3-2021-2682,SUSE-SLE-Module-SUSE-Manager-Proxy-4.2-2021-2682,SUSE-SLE-Module-SUSE-Manager-Server-4.2-2021-2682",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_2682-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2021:2682-1",
"url": "https://www.suse.com/support/update/announcement/2021/suse-su-20212682-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2021:2682-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2021-August/009290.html"
},
{
"category": "self",
"summary": "SUSE Bug 1179416",
"url": "https://bugzilla.suse.com/1179416"
},
{
"category": "self",
"summary": "SUSE Bug 1181805",
"url": "https://bugzilla.suse.com/1181805"
},
{
"category": "self",
"summary": "SUSE Bug 1183543",
"url": "https://bugzilla.suse.com/1183543"
},
{
"category": "self",
"summary": "SUSE Bug 1183545",
"url": "https://bugzilla.suse.com/1183545"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20266 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-20271 page",
"url": "https://www.suse.com/security/cve/CVE-2021-20271/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-3421 page",
"url": "https://www.suse.com/security/cve/CVE-2021-3421/"
}
],
"title": "Security update for rpm",
"tracking": {
"current_release_date": "2021-08-12T18:06:48Z",
"generator": {
"date": "2021-08-12T18:06:48Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2021:2682-1",
"initial_release_date": "2021-08-12T18:06:48Z",
"revision_history": [
{
"date": "2021-08-12T18:06:48Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.3-37.2.aarch64",
"product": {
"name": "python2-rpm-4.14.3-37.2.aarch64",
"product_id": "python2-rpm-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.3-37.2.aarch64",
"product": {
"name": "python3-rpm-4.14.3-37.2.aarch64",
"product_id": "python3-rpm-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-4.14.3-37.2.aarch64",
"product": {
"name": "rpm-4.14.3-37.2.aarch64",
"product_id": "rpm-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.3-37.2.aarch64",
"product": {
"name": "rpm-build-4.14.3-37.2.aarch64",
"product_id": "rpm-build-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.3-37.2.aarch64",
"product": {
"name": "rpm-devel-4.14.3-37.2.aarch64",
"product_id": "rpm-devel-4.14.3-37.2.aarch64"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.3-37.2.aarch64",
"product": {
"name": "rpm-ndb-4.14.3-37.2.aarch64",
"product_id": "rpm-ndb-4.14.3-37.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rpm-64bit-4.14.3-37.2.aarch64_ilp32",
"product": {
"name": "rpm-64bit-4.14.3-37.2.aarch64_ilp32",
"product_id": "rpm-64bit-4.14.3-37.2.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "rpm-ndb-64bit-4.14.3-37.2.aarch64_ilp32",
"product": {
"name": "rpm-ndb-64bit-4.14.3-37.2.aarch64_ilp32",
"product_id": "rpm-ndb-64bit-4.14.3-37.2.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.3-37.2.i586",
"product": {
"name": "python2-rpm-4.14.3-37.2.i586",
"product_id": "python2-rpm-4.14.3-37.2.i586"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.3-37.2.i586",
"product": {
"name": "python3-rpm-4.14.3-37.2.i586",
"product_id": "python3-rpm-4.14.3-37.2.i586"
}
},
{
"category": "product_version",
"name": "rpm-4.14.3-37.2.i586",
"product": {
"name": "rpm-4.14.3-37.2.i586",
"product_id": "rpm-4.14.3-37.2.i586"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.3-37.2.i586",
"product": {
"name": "rpm-build-4.14.3-37.2.i586",
"product_id": "rpm-build-4.14.3-37.2.i586"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.3-37.2.i586",
"product": {
"name": "rpm-devel-4.14.3-37.2.i586",
"product_id": "rpm-devel-4.14.3-37.2.i586"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.3-37.2.i586",
"product": {
"name": "rpm-ndb-4.14.3-37.2.i586",
"product_id": "rpm-ndb-4.14.3-37.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.3-37.2.ppc64le",
"product": {
"name": "python2-rpm-4.14.3-37.2.ppc64le",
"product_id": "python2-rpm-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.3-37.2.ppc64le",
"product": {
"name": "python3-rpm-4.14.3-37.2.ppc64le",
"product_id": "python3-rpm-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-4.14.3-37.2.ppc64le",
"product": {
"name": "rpm-4.14.3-37.2.ppc64le",
"product_id": "rpm-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.3-37.2.ppc64le",
"product": {
"name": "rpm-build-4.14.3-37.2.ppc64le",
"product_id": "rpm-build-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.3-37.2.ppc64le",
"product": {
"name": "rpm-devel-4.14.3-37.2.ppc64le",
"product_id": "rpm-devel-4.14.3-37.2.ppc64le"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.3-37.2.ppc64le",
"product": {
"name": "rpm-ndb-4.14.3-37.2.ppc64le",
"product_id": "rpm-ndb-4.14.3-37.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.3-37.2.s390x",
"product": {
"name": "python2-rpm-4.14.3-37.2.s390x",
"product_id": "python2-rpm-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.3-37.2.s390x",
"product": {
"name": "python3-rpm-4.14.3-37.2.s390x",
"product_id": "python3-rpm-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-4.14.3-37.2.s390x",
"product": {
"name": "rpm-4.14.3-37.2.s390x",
"product_id": "rpm-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.3-37.2.s390x",
"product": {
"name": "rpm-build-4.14.3-37.2.s390x",
"product_id": "rpm-build-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.3-37.2.s390x",
"product": {
"name": "rpm-devel-4.14.3-37.2.s390x",
"product_id": "rpm-devel-4.14.3-37.2.s390x"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.3-37.2.s390x",
"product": {
"name": "rpm-ndb-4.14.3-37.2.s390x",
"product_id": "rpm-ndb-4.14.3-37.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-rpm-4.14.3-37.2.x86_64",
"product": {
"name": "python2-rpm-4.14.3-37.2.x86_64",
"product_id": "python2-rpm-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "python3-rpm-4.14.3-37.2.x86_64",
"product": {
"name": "python3-rpm-4.14.3-37.2.x86_64",
"product_id": "python3-rpm-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-4.14.3-37.2.x86_64",
"product_id": "rpm-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-32bit-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-32bit-4.14.3-37.2.x86_64",
"product_id": "rpm-32bit-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-build-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-build-4.14.3-37.2.x86_64",
"product_id": "rpm-build-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-devel-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-devel-4.14.3-37.2.x86_64",
"product_id": "rpm-devel-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-ndb-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-ndb-4.14.3-37.2.x86_64",
"product_id": "rpm-ndb-4.14.3-37.2.x86_64"
}
},
{
"category": "product_version",
"name": "rpm-ndb-32bit-4.14.3-37.2.x86_64",
"product": {
"name": "rpm-ndb-32bit-4.14.3-37.2.x86_64",
"product_id": "rpm-ndb-32bit-4.14.3-37.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 2 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Module for Python 2 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python2:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy Module 4.2",
"product": {
"name": "SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-proxy:4.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server Module 4.2",
"product": {
"name": "SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-suse-manager-server:4.2"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.3-37.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64"
},
"product_reference": "python3-rpm-4.14.3-37.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.3-37.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le"
},
"product_reference": "python3-rpm-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.3-37.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x"
},
"product_reference": "python3-rpm-4.14.3-37.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-rpm-4.14.3-37.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64"
},
"product_reference": "python3-rpm-4.14.3-37.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.3-37.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-4.14.3-37.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.3-37.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.3-37.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x"
},
"product_reference": "rpm-4.14.3-37.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-4.14.3-37.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-4.14.3-37.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-32bit-4.14.3-37.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-32bit-4.14.3-37.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.3-37.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-devel-4.14.3-37.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.3-37.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-devel-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.3-37.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x"
},
"product_reference": "rpm-devel-4.14.3-37.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-devel-4.14.3-37.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-devel-4.14.3-37.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-build-4.14.3-37.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-build-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x"
},
"product_reference": "rpm-build-4.14.3-37.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-build-4.14.3-37.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.3-37.2.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-ndb-4.14.3-37.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.3-37.2.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-ndb-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.3-37.2.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x"
},
"product_reference": "rpm-ndb-4.14.3-37.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-ndb-4.14.3-37.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-ndb-4.14.3-37.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.3-37.2.aarch64 as component of SUSE Linux Enterprise Module for Python 2 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64"
},
"product_reference": "python2-rpm-4.14.3-37.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.3-37.2.ppc64le as component of SUSE Linux Enterprise Module for Python 2 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le"
},
"product_reference": "python2-rpm-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.3-37.2.s390x as component of SUSE Linux Enterprise Module for Python 2 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x"
},
"product_reference": "python2-rpm-4.14.3-37.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-rpm-4.14.3-37.2.x86_64 as component of SUSE Linux Enterprise Module for Python 2 15 SP3",
"product_id": "SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64"
},
"product_reference": "python2-rpm-4.14.3-37.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 2 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.aarch64 as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-build-4.14.3-37.2.aarch64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.ppc64le as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-build-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.s390x as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x"
},
"product_reference": "rpm-build-4.14.3-37.2.s390x",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.x86_64 as component of SUSE Manager Proxy Module 4.2",
"product_id": "SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-build-4.14.3-37.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.aarch64 as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64"
},
"product_reference": "rpm-build-4.14.3-37.2.aarch64",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.ppc64le as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le"
},
"product_reference": "rpm-build-4.14.3-37.2.ppc64le",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.s390x as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x"
},
"product_reference": "rpm-build-4.14.3-37.2.s390x",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rpm-build-4.14.3-37.2.x86_64 as component of SUSE Manager Server Module 4.2",
"product_id": "SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
},
"product_reference": "rpm-build-4.14.3-37.2.x86_64",
"relates_to_product_reference": "SUSE Manager Server Module 4.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-20266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20266"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s hdrblobInit() in lib/header.c. This flaw allows an attacker who can modify the rpmdb to cause an out-of-bounds read. The highest threat from this vulnerability is to system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20266",
"url": "https://www.suse.com/security/cve/CVE-2021-20266"
},
{
"category": "external",
"summary": "SUSE Bug 1183632 for CVE-2021-20266",
"url": "https://bugzilla.suse.com/1183632"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-12T18:06:48Z",
"details": "low"
}
],
"title": "CVE-2021-20266"
},
{
"cve": "CVE-2021-20271",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-20271"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in RPM\u0027s signature check functionality when reading a package file. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package, whose signature header was modified, to cause RPM database corruption and execute code. The highest threat from this vulnerability is to data integrity, confidentiality, and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-20271",
"url": "https://www.suse.com/security/cve/CVE-2021-20271"
},
{
"category": "external",
"summary": "SUSE Bug 1183545 for CVE-2021-20271",
"url": "https://bugzilla.suse.com/1183545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-12T18:06:48Z",
"details": "low"
}
],
"title": "CVE-2021-20271"
},
{
"cve": "CVE-2021-3421",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-3421"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-3421",
"url": "https://www.suse.com/security/cve/CVE-2021-3421"
},
{
"category": "external",
"summary": "SUSE Bug 1183543 for CVE-2021-3421",
"url": "https://bugzilla.suse.com/1183543"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:python3-rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-32bit-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP3:rpm-devel-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP3:rpm-build-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP3:rpm-ndb-4.14.3-37.2.x86_64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.aarch64",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.ppc64le",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.s390x",
"SUSE Linux Enterprise Module for Python 2 15 SP3:python2-rpm-4.14.3-37.2.x86_64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Proxy Module 4.2:rpm-build-4.14.3-37.2.x86_64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.aarch64",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.ppc64le",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.s390x",
"SUSE Manager Server Module 4.2:rpm-build-4.14.3-37.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2021-08-12T18:06:48Z",
"details": "moderate"
}
],
"title": "CVE-2021-3421"
}
]
}
MSRC_CVE-2021-3421
Vulnerability from csaf_microsoft - Published: 2021-05-02 00:00 - Updated: 2021-06-04 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-3421 A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-3421.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"tracking": {
"current_release_date": "2021-06-04T00:00:00.000Z",
"generator": {
"date": "2025-10-19T21:59:28.362Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-3421",
"initial_release_date": "2021-05-02T00:00:00.000Z",
"revision_history": [
{
"date": "2021-06-04T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "1.0",
"product": {
"name": "CBL Mariner 1.0",
"product_id": "16820"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm1 rpm 4.14.2-11",
"product": {
"name": "\u003ccm1 rpm 4.14.2-11",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cm1 rpm 4.14.2-11",
"product": {
"name": "cm1 rpm 4.14.2-11",
"product_id": "19051"
}
}
],
"category": "product_name",
"name": "rpm"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm1 rpm 4.14.2-11 as a component of CBL Mariner 1.0",
"product_id": "16820-1"
},
"product_reference": "1",
"relates_to_product_reference": "16820"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm1 rpm 4.14.2-11 as a component of CBL Mariner 1.0",
"product_id": "19051-16820"
},
"product_reference": "19051",
"relates_to_product_reference": "16820"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-3421",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19051-16820"
],
"known_affected": [
"16820-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-3421 A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2021/msrc_cve-2021-3421.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2021-06-04T00:00:00.000Z",
"details": "4.14.2-11:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"16820-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"16820-1"
]
}
],
"title": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha."
}
]
}
GHSA-F7WW-C7V4-G682
Vulnerability from github – Published: 2022-05-24 19:02 – Updated: 2022-06-04 00:00A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.
{
"affected": [],
"aliases": [
"CVE-2021-3421"
],
"database_specific": {
"cwe_ids": [
"CWE-347"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-05-19T14:15:00Z",
"severity": "MODERATE"
},
"details": "A flaw was found in the RPM package in the read functionality. This flaw allows an attacker who can convince a victim to install a seemingly verifiable package or compromise an RPM repository, to cause RPM database corruption. The highest threat from this vulnerability is to data integrity. This flaw affects RPM versions before 4.17.0-alpha.",
"id": "GHSA-f7ww-c7v4-g682",
"modified": "2022-06-04T00:00:32Z",
"published": "2022-05-24T19:02:48Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-3421"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1927747"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TMGXO3W6DHPO62GJ4VVF5DEUX5DRUR5K"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VHRPNBCRPDJHHQE3MBPSZK4H7X2IM7AC"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YILPBTPSBRYL4POBI3F4YUSVPSOQNJBY"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/202107-43"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.