Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-44964 (GCVE-0-2021-44964)
Vulnerability from cvelistv5 – Published: 2022-03-14 14:24 – Updated: 2024-08-04 04:32- n/a
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T04:32:13.466Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-03-14T14:24:51",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-44964",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html",
"refsource": "MISC",
"url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
},
{
"name": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
"refsource": "MISC",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"name": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html",
"refsource": "MISC",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
},
{
"name": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html",
"refsource": "MISC",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
},
{
"name": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability",
"refsource": "MISC",
"url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-44964",
"datePublished": "2022-03-14T14:24:51",
"dateReserved": "2021-12-13T00:00:00",
"dateUpdated": "2024-08-04T04:32:13.466Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"5.4.0\", \"versionEndIncluding\": \"5.4.3\", \"matchCriteriaId\": \"36E29101-6009-4A41-AF33-FDD5EA753F91\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\"}, {\"lang\": \"es\", \"value\": \"Un uso de memoria previamente liberada en el recolector de basura y en el finalizador de lgc.c en el int\\u00e9rprete de Lua versiones 5.4.0~5.4.3, permite a atacantes llevar a cabo un Escape del Sandbox por medio de un archivo de script dise\\u00f1ado\"}]",
"id": "CVE-2021-44964",
"lastModified": "2024-11-21T06:31:44.853",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H\", \"baseScore\": 6.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 4.0}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:N/A:P\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2022-03-14T15:15:09.373",
"references": "[{\"url\": \"http://lua-users.org/lists/lua-l/2021-11/msg00186.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Technical Description\", \"Vendor Advisory\"]}, {\"url\": \"http://lua-users.org/lists/lua-l/2021-12/msg00007.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"http://lua-users.org/lists/lua-l/2021-12/msg00015.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"http://lua-users.org/lists/lua-l/2021-12/msg00030.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"http://lua-users.org/lists/lua-l/2021-11/msg00186.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Technical Description\", \"Vendor Advisory\"]}, {\"url\": \"http://lua-users.org/lists/lua-l/2021-12/msg00007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"http://lua-users.org/lists/lua-l/2021-12/msg00015.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"http://lua-users.org/lists/lua-l/2021-12/msg00030.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\", \"Vendor Advisory\"]}, {\"url\": \"https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-416\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-44964\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-03-14T15:15:09.373\",\"lastModified\":\"2024-11-21T06:31:44.853\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.\"},{\"lang\":\"es\",\"value\":\"Un uso de memoria previamente liberada en el recolector de basura y en el finalizador de lgc.c en el int\u00e9rprete de Lua versiones 5.4.0~5.4.3, permite a atacantes llevar a cabo un Escape del Sandbox por medio de un archivo de script dise\u00f1ado\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H\",\"baseScore\":6.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.0}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:N/A:P\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.4.0\",\"versionEndIncluding\":\"5.4.3\",\"matchCriteriaId\":\"36E29101-6009-4A41-AF33-FDD5EA753F91\"}]}]}],\"references\":[{\"url\":\"http://lua-users.org/lists/lua-l/2021-11/msg00186.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00007.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00015.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00030.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-11/msg00186.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Technical Description\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00015.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"http://lua-users.org/lists/lua-l/2021-12/msg00030.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Vendor Advisory\"]},{\"url\":\"https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}"
}
}
WID-SEC-W-2023-1542
Vulnerability from csaf_certbund - Published: 2023-06-22 22:00 - Updated: 2025-10-23 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat OpenShift ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren, Informationen offenzulegen, Dateien zu manipulieren oder Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1542 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1542.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1542 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1542"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3742 vom 2023-06-22",
"url": "https://access.redhat.com/errata/RHSA-2023:3742"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3612 vom 2023-06-23",
"url": "https://access.redhat.com/errata/RHSA-2023:3614"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3615 vom 2023-06-22",
"url": "https://access.redhat.com/errata/RHSA-2023:3615"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3613 vom 2023-06-27",
"url": "https://access.redhat.com/errata/RHSA-2023:3613"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2023-06-29",
"url": "https://access.redhat.com/errata/RHSA-2023:3918"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3943 vom 2023-06-29",
"url": "https://access.redhat.com/errata/RHSA-2023:3943"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3910 vom 2023-07-06",
"url": "https://access.redhat.com/errata/RHSA-2023:3910"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3915 vom 2023-07-06",
"url": "https://access.redhat.com/errata/RHSA-2023:3915"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:3925 vom 2023-07-06",
"url": "https://access.redhat.com/errata/RHSA-2023:3925"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4003 vom 2023-07-10",
"url": "https://access.redhat.com/errata/RHSA-2023:4003"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-6CFE7492C1 vom 2023-07-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-6cfe7492c1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-AA7C75ED4A vom 2023-07-16",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-aa7c75ed4a"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4025 vom 2023-07-18",
"url": "https://access.redhat.com/errata/RHSA-2023:4025"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4112 vom 2023-07-18",
"url": "https://access.redhat.com/errata/RHSA-2023:4112"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4113 vom 2023-07-18",
"url": "https://access.redhat.com/errata/RHSA-2023:4113"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4114 vom 2023-07-18",
"url": "https://access.redhat.com/errata/RHSA-2023:4114"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4053 vom 2023-07-19",
"url": "https://access.redhat.com/errata/RHSA-2023:4053"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4204 vom 2023-07-19",
"url": "https://access.redhat.com/errata/RHSA-2023:4204"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4090 vom 2023-07-21",
"url": "https://access.redhat.com/errata/RHSA-2023:4090"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4241 vom 2023-07-21",
"url": "https://access.redhat.com/errata/RHSA-2023:4241"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4238 vom 2023-07-20",
"url": "https://access.redhat.com/errata/RHSA-2023:4238"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4093 vom 2023-07-20",
"url": "https://access.redhat.com/errata/RHSA-2023:4093"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4091 vom 2023-07-20",
"url": "https://access.redhat.com/errata/RHSA-2023:4091"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4225 vom 2023-07-27",
"url": "https://access.redhat.com/errata/RHSA-2023:4225"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4226 vom 2023-07-27",
"url": "https://access.redhat.com/errata/RHSA-2023:4226"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4470 vom 2023-08-03",
"url": "https://access.redhat.com/errata/RHSA-2023:4470"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4335 vom 2023-08-08",
"url": "https://access.redhat.com/errata/RHSA-2023:4335"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4674 vom 2023-08-23",
"url": "https://access.redhat.com/errata/RHSA-2023:4674"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:4983 vom 2023-09-05",
"url": "https://access.redhat.com/errata/RHSA-2023:4983"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5103 vom 2023-09-12",
"url": "https://access.redhat.com/errata/RHSA-2023:5103"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5233 vom 2023-09-19",
"url": "https://access.redhat.com/errata/RHSA-2023:5233"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5314 vom 2023-09-20",
"url": "https://access.redhat.com/errata/RHSA-2023:5314"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6316 vom 2023-11-07",
"url": "https://access.redhat.com/errata/RHSA-2023:6316"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7058 vom 2023-11-15",
"url": "https://access.redhat.com/errata/RHSA-2023:7058"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2023-6939 vom 2023-11-21",
"url": "https://linux.oracle.com/errata/ELSA-2023-6939.html"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2023-14A33318B8 vom 2023-12-03",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2023-14a33318b8"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7672 vom 2023-12-06",
"url": "https://access.redhat.com/errata/RHSA-2023:7672"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7820 vom 2023-12-14",
"url": "https://access.redhat.com/errata/RHSA-2023:7820"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:5006 vom 2023-12-30",
"url": "https://access.redhat.com/errata/RHSA-2023:5006"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:7823 vom 2024-01-05",
"url": "https://access.redhat.com/errata/RHSA-2023:7823"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0139 vom 2024-01-10",
"url": "https://access.redhat.com/errata/RHSA-2024:0139"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0143 vom 2024-01-10",
"url": "https://access.redhat.com/errata/RHSA-2024:0143"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0137 vom 2024-01-10",
"url": "https://access.redhat.com/errata/RHSA-2024:0137"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:0121 vom 2024-01-10",
"url": "https://access.redhat.com/errata/RHSA-2024:0121"
},
{
"category": "external",
"summary": "Meinberg Security Advisory",
"url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2024-01-lantime-firmware-v7-08-007.htm"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202405-04 vom 2024-05-04",
"url": "https://security.gentoo.org/glsa/202405-04"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:2987 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:2987"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3254 vom 2024-05-22",
"url": "https://access.redhat.com/errata/RHSA-2024:3254"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:4631 vom 2024-07-18",
"url": "https://access.redhat.com/errata/RHSA-2024:4631"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19094 vom 2025-10-24",
"url": "https://access.redhat.com/errata/RHSA-2025:19094"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenShift: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-23T22:00:00.000+00:00",
"generator": {
"date": "2025-10-24T08:33:28.970+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-1542",
"initial_release_date": "2023-06-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-06-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-06-25T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-26T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-28T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-06-29T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-07-05T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-07-06T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-07-10T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-07-16T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-07-17T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-07-18T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-07-20T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-07-26T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-08-03T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-08-07T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-08-23T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-09-05T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-09-12T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-09-19T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-09-20T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-11-07T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-11-14T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-11-21T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2023-12-03T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Fedora aufgenommen"
},
{
"date": "2023-12-06T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-12-13T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-01T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-04T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-10T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-01-30T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Meinberg aufgenommen"
},
{
"date": "2024-05-05T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2024-05-21T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-07-18T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "34"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.08.007",
"product": {
"name": "Meinberg LANTIME \u003c7.08.007",
"product_id": "T032435"
}
},
{
"category": "product_version",
"name": "7.08.007",
"product": {
"name": "Meinberg LANTIME 7.08.007",
"product_id": "T032435-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:meinberg:lantime:7.08.007"
}
}
}
],
"category": "product_name",
"name": "LANTIME"
}
],
"category": "vendor",
"name": "Meinberg"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Advanced Cluster Security for Kubernetes 4",
"product": {
"name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
"product_id": "T027916",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
}
}
},
{
"category": "product_version",
"name": "Service Interconnect 1",
"product": {
"name": "Red Hat Enterprise Linux Service Interconnect 1",
"product_id": "T028472",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:service_interconnect_1"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift",
"product": {
"name": "Red Hat OpenShift",
"product_id": "T008027",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:-"
}
}
},
{
"category": "product_version",
"name": "Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "T026435",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.13.4",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.13.4",
"product_id": "T028225"
}
},
{
"category": "product_version",
"name": "Container Platform 4.13.4",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13.4",
"product_id": "T028225-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.13.4"
}
}
},
{
"category": "product_version_range",
"name": "Data Foundation \u003c4.13.0",
"product": {
"name": "Red Hat OpenShift Data Foundation \u003c4.13.0",
"product_id": "T028289"
}
},
{
"category": "product_version",
"name": "Data Foundation 4.13.0",
"product": {
"name": "Red Hat OpenShift Data Foundation 4.13.0",
"product_id": "T028289-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:data_foundation_4.13.0"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.22",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.22",
"product_id": "T028307"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12.22",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12.22",
"product_id": "T028307-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.12.22"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.11.44",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.11.44",
"product_id": "T028416"
}
},
{
"category": "product_version",
"name": "Container Platform 4.11.44",
"product": {
"name": "Red Hat OpenShift Container Platform 4.11.44",
"product_id": "T028416-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.11.44"
}
}
},
{
"category": "product_version_range",
"name": "Data Foundation \u003c4.12.10",
"product": {
"name": "Red Hat OpenShift Data Foundation \u003c4.12.10",
"product_id": "T031698"
}
},
{
"category": "product_version",
"name": "Data Foundation 4.12.10",
"product": {
"name": "Red Hat OpenShift Data Foundation 4.12.10",
"product_id": "T031698-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:data_foundation__4.12.10"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.0",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.0",
"product_id": "T031839"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.0",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.0",
"product_id": "T031839-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.0"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.46",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.46",
"product_id": "T031870"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12.46",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12.46",
"product_id": "T031870-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.12.46"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2015-20107",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2015-20107"
},
{
"cve": "CVE-2018-25032",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2018-25032"
},
{
"cve": "CVE-2020-10735",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2020-10735"
},
{
"cve": "CVE-2020-16250",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2020-16250"
},
{
"cve": "CVE-2020-16251",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2020-16251"
},
{
"cve": "CVE-2020-17049",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2020-17049"
},
{
"cve": "CVE-2021-28861",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-28861"
},
{
"cve": "CVE-2021-3765",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-3765"
},
{
"cve": "CVE-2021-3807",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-3807"
},
{
"cve": "CVE-2021-4231",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-4231"
},
{
"cve": "CVE-2021-4235",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-4235"
},
{
"cve": "CVE-2021-4238",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-4238"
},
{
"cve": "CVE-2021-43519",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-43519"
},
{
"cve": "CVE-2021-43998",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-43998"
},
{
"cve": "CVE-2021-44531",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-44531"
},
{
"cve": "CVE-2021-44532",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-44532"
},
{
"cve": "CVE-2021-44533",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-44533"
},
{
"cve": "CVE-2021-44964",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-44964"
},
{
"cve": "CVE-2021-46828",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-46828"
},
{
"cve": "CVE-2021-46848",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2021-46848"
},
{
"cve": "CVE-2022-0670",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-0670"
},
{
"cve": "CVE-2022-1271",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-1271"
},
{
"cve": "CVE-2022-1304",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-1304"
},
{
"cve": "CVE-2022-1348",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-1348"
},
{
"cve": "CVE-2022-1586",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-1586"
},
{
"cve": "CVE-2022-1587",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-1587"
},
{
"cve": "CVE-2022-21824",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-21824"
},
{
"cve": "CVE-2022-2309",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-2309"
},
{
"cve": "CVE-2022-23540",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-23540"
},
{
"cve": "CVE-2022-23541",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-23541"
},
{
"cve": "CVE-2022-24903",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-24903"
},
{
"cve": "CVE-2022-2509",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-2509"
},
{
"cve": "CVE-2022-26280",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-26280"
},
{
"cve": "CVE-2022-27664",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-27664"
},
{
"cve": "CVE-2022-2795",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-2795"
},
{
"cve": "CVE-2022-2879",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-2879"
},
{
"cve": "CVE-2022-2880",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-2880"
},
{
"cve": "CVE-2022-28805",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-28805"
},
{
"cve": "CVE-2022-29154",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-29154"
},
{
"cve": "CVE-2022-30635",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-30635"
},
{
"cve": "CVE-2022-3094",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-3094"
},
{
"cve": "CVE-2022-31129",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-31129"
},
{
"cve": "CVE-2022-32189",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-32189"
},
{
"cve": "CVE-2022-32190",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-32190"
},
{
"cve": "CVE-2022-33099",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-33099"
},
{
"cve": "CVE-2022-3358",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-3358"
},
{
"cve": "CVE-2022-34903",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-34903"
},
{
"cve": "CVE-2022-3515",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-3515"
},
{
"cve": "CVE-2022-3517",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-35737",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-35737"
},
{
"cve": "CVE-2022-36227",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-36227"
},
{
"cve": "CVE-2022-3715",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-3715"
},
{
"cve": "CVE-2022-3736",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-3736"
},
{
"cve": "CVE-2022-37434",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-38149",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-38149"
},
{
"cve": "CVE-2022-3821",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-3821"
},
{
"cve": "CVE-2022-38900",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-38900"
},
{
"cve": "CVE-2022-3924",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-3924"
},
{
"cve": "CVE-2022-40023",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-40023"
},
{
"cve": "CVE-2022-40303",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-40303"
},
{
"cve": "CVE-2022-40304",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-40304"
},
{
"cve": "CVE-2022-40897",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-40897"
},
{
"cve": "CVE-2022-41316",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-41316"
},
{
"cve": "CVE-2022-41715",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-41715"
},
{
"cve": "CVE-2022-41717",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-41717"
},
{
"cve": "CVE-2022-41723",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-41723"
},
{
"cve": "CVE-2022-41724",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-41724"
},
{
"cve": "CVE-2022-41725",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-41725"
},
{
"cve": "CVE-2022-42010",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-42010"
},
{
"cve": "CVE-2022-42011",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-42011"
},
{
"cve": "CVE-2022-42012",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-42012"
},
{
"cve": "CVE-2022-42898",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-42898"
},
{
"cve": "CVE-2022-42919",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-42919"
},
{
"cve": "CVE-2022-43680",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-43680"
},
{
"cve": "CVE-2022-4415",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-4415"
},
{
"cve": "CVE-2022-45061",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-45061"
},
{
"cve": "CVE-2022-45873",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-45873"
},
{
"cve": "CVE-2022-46175",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-46175"
},
{
"cve": "CVE-2022-47024",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-47024"
},
{
"cve": "CVE-2022-47629",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-47629"
},
{
"cve": "CVE-2022-48303",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-48303"
},
{
"cve": "CVE-2022-48337",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-48337"
},
{
"cve": "CVE-2022-48338",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-48338"
},
{
"cve": "CVE-2022-48339",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2022-48339"
},
{
"cve": "CVE-2023-0361",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2023-0361"
},
{
"cve": "CVE-2023-0620",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2023-0620"
},
{
"cve": "CVE-2023-0665",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2023-0665"
},
{
"cve": "CVE-2023-22809",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2023-22809"
},
{
"cve": "CVE-2023-24329",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-2491",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2023-2491"
},
{
"cve": "CVE-2023-24999",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2023-24999"
},
{
"cve": "CVE-2023-25000",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2023-25000"
},
{
"cve": "CVE-2023-25136",
"product_status": {
"known_affected": [
"T032435",
"T031698",
"T008027",
"T028472",
"67646",
"T012167",
"T004914",
"74185",
"T031870",
"T027916",
"T028307",
"T028416",
"T026435",
"T028225",
"T031839",
"T028289"
]
},
"release_date": "2023-06-22T22:00:00.000+00:00",
"title": "CVE-2023-25136"
}
]
}
WID-SEC-W-2023-0522
Vulnerability from csaf_certbund - Published: 2023-02-28 23:00 - Updated: 2023-03-14 23:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder Sicherheitsvorkehrungen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0522 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0522.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0522 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0522"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:1211 vom 2023-03-14",
"url": "https://access.redhat.com/errata/RHSA-2023:1211"
},
{
"category": "external",
"summary": "Red Hat Security Advisory vom 2023-02-28",
"url": "https://access.redhat.com/errata/RHSA-2023:0957"
}
],
"source_lang": "en-US",
"title": "Red Hat Enterprise Linux (lua): Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2023-03-14T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:45:46.979+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0522",
"initial_release_date": "2023-02-28T23:00:00.000+00:00",
"revision_history": [
{
"date": "2023-02-28T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-03-14T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux lua",
"product": {
"name": "Red Hat Enterprise Linux lua",
"product_id": "T026559",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:lua"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-44964",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese ist auf einen Fehler in der Komponente \"lua\" zur\u00fcckzuf\u00fchren. Ein malizi\u00f6ses Skript kann im Lua Interpreter ausgef\u00fchrt werden, in Folge kann aus der Sandbox ausgebrochen werden. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um Sicherheitsvorkehrungen zu umgehen."
}
],
"product_status": {
"known_affected": [
"T026559",
"67646"
]
},
"release_date": "2023-02-28T23:00:00.000+00:00",
"title": "CVE-2021-44964"
},
{
"cve": "CVE-2021-43519",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in Red Hat Enterprise Linux. Diese besteht in der Komponente \"lua\" und ist auf einen stapelbasierten Puffer\u00fcberlauf zur\u00fcckzuf\u00fchren. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T026559",
"67646"
]
},
"release_date": "2023-02-28T23:00:00.000+00:00",
"title": "CVE-2021-43519"
}
]
}
GSD-2021-44964
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-44964",
"description": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
"id": "GSD-2021-44964",
"references": [
"https://www.suse.com/security/cve/CVE-2021-44964.html",
"https://access.redhat.com/errata/RHSA-2023:0957"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-44964"
],
"details": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
"id": "GSD-2021-44964",
"modified": "2023-12-13T01:23:20.176608Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-44964",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html",
"refsource": "MISC",
"url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
},
{
"name": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
"refsource": "MISC",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"name": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html",
"refsource": "MISC",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
},
{
"name": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html",
"refsource": "MISC",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
},
{
"name": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability",
"refsource": "MISC",
"url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=5.4.0 \u003c=5.4.3",
"affected_versions": "All versions starting from 5.4.0 up to 5.4.3",
"cvss_v2": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-416",
"CWE-937"
],
"date": "2022-03-21",
"description": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
"fixed_versions": [
"5.4.4"
],
"identifier": "CVE-2021-44964",
"identifiers": [
"CVE-2021-44964"
],
"not_impacted": "All versions before 5.4.0, all versions after 5.4.3",
"package_slug": "conan/lua",
"pubdate": "2022-03-14",
"solution": "Upgrade to version 5.4.4 or above.",
"title": "Use After Free",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
"http://lua-users.org/lists/lua-l/2021-12/msg00030.html",
"http://lua-users.org/lists/lua-l/2021-12/msg00015.html",
"https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability",
"http://lua-users.org/lists/lua-l/2021-11/msg00186.html",
"http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
],
"uuid": "5233bfcc-6728-4ce4-83ab-04492ed03352"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "5.4.3",
"versionStartIncluding": "5.4.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-44964"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html",
"refsource": "MISC",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
},
{
"name": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html",
"refsource": "MISC",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
},
{
"name": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability",
"refsource": "MISC",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
},
{
"name": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Mailing List",
"Technical Description",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
},
{
"name": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
"refsource": "MISC",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4.0
}
},
"lastModifiedDate": "2022-03-21T05:17Z",
"publishedDate": "2022-03-14T15:15Z"
}
}
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
CERTFR-2025-AVI-1057
Vulnerability from certfr_avis - Published: 2025-12-02 - Updated: 2025-12-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.11.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 14.x antérieures à 14.20.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.7.0 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.1 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.1.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.15.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 13.x antérieures à 13.23.0 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.11.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 14.x ant\u00e9rieures \u00e0 14.20.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.7.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.1",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.1.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.15.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 13.x ant\u00e9rieures \u00e0 13.23.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-20227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20227"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2022-23960",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23960"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-3629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3629"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2022-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3633"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-3903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3903"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2022-26878",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26878"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1974"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-20154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20154"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2021-36690",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36690"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-27672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27672"
},
{
"name": "CVE-2023-0045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0045"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-1118",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1118"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2023-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1838"
},
{
"name": "CVE-2023-28410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28410"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27779",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27779"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-30115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30115"
},
{
"name": "CVE-2023-1380",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1380"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2022-3534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3534"
},
{
"name": "CVE-2023-2156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2156"
},
{
"name": "CVE-2023-3006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3006"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2021-31239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31239"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-4387",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4387"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-31085",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31085"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2019-17498",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17498"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-52467",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52467"
},
{
"name": "CVE-2023-52451",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52451"
},
{
"name": "CVE-2023-52445",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52445"
},
{
"name": "CVE-2024-26598",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26598"
},
{
"name": "CVE-2023-52462",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52462"
},
{
"name": "CVE-2023-52469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52469"
},
{
"name": "CVE-2023-52470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52470"
},
{
"name": "CVE-2023-52464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52464"
},
{
"name": "CVE-2023-52475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52475"
},
{
"name": "CVE-2023-52478",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52478"
},
{
"name": "CVE-2024-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26603"
},
{
"name": "CVE-2023-52452",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52452"
},
{
"name": "CVE-2023-52532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52532"
},
{
"name": "CVE-2019-25162",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25162"
},
{
"name": "CVE-2021-46904",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46904"
},
{
"name": "CVE-2024-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24855"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2024-26631",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26631"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2023-52501",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52501"
},
{
"name": "CVE-2023-52519",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52519"
},
{
"name": "CVE-2024-26717",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26717"
},
{
"name": "CVE-2024-26670",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26670"
},
{
"name": "CVE-2023-52477",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52477"
},
{
"name": "CVE-2023-52528",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52528"
},
{
"name": "CVE-2023-52582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52582"
},
{
"name": "CVE-2021-47098",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47098"
},
{
"name": "CVE-2023-52513",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52513"
},
{
"name": "CVE-2024-22099",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22099"
},
{
"name": "CVE-2021-47097",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47097"
},
{
"name": "CVE-2023-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52520"
},
{
"name": "CVE-2023-7042",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7042"
},
{
"name": "CVE-2023-52523",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52523"
},
{
"name": "CVE-2024-26803",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26803"
},
{
"name": "CVE-2024-24858",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24858"
},
{
"name": "CVE-2024-24857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24857"
},
{
"name": "CVE-2024-26660",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26660"
},
{
"name": "CVE-2024-26760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26760"
},
{
"name": "CVE-2024-26681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26681"
},
{
"name": "CVE-2024-26815",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26815"
},
{
"name": "CVE-2024-26621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26621"
},
{
"name": "CVE-2024-26714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26714"
},
{
"name": "CVE-2024-26761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26761"
},
{
"name": "CVE-2024-26742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26742"
},
{
"name": "CVE-2021-47020",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47020"
},
{
"name": "CVE-2021-47017",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47017"
},
{
"name": "CVE-2021-46984",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46984"
},
{
"name": "CVE-2021-47071",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47071"
},
{
"name": "CVE-2021-47202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47202"
},
{
"name": "CVE-2024-26605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26605"
},
{
"name": "CVE-2024-26989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26989"
},
{
"name": "CVE-2024-27003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27003"
},
{
"name": "CVE-2024-26987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26987"
},
{
"name": "CVE-2024-27015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27015"
},
{
"name": "CVE-2024-27014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27014"
},
{
"name": "CVE-2024-26992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26992"
},
{
"name": "CVE-2023-52468",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52468"
},
{
"name": "CVE-2023-52487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52487"
},
{
"name": "CVE-2024-26618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26618"
},
{
"name": "CVE-2023-52490",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52490"
},
{
"name": "CVE-2023-52455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52455"
},
{
"name": "CVE-2023-52472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52472"
},
{
"name": "CVE-2023-52643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52643"
},
{
"name": "CVE-2024-26649",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26649"
},
{
"name": "CVE-2023-52473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52473"
},
{
"name": "CVE-2023-52465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52465"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2024-27042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27042"
},
{
"name": "CVE-2021-47197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47197"
},
{
"name": "CVE-2021-47196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47196"
},
{
"name": "CVE-2022-48702",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48702"
},
{
"name": "CVE-2022-48701",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48701"
},
{
"name": "CVE-2022-48694",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48694"
},
{
"name": "CVE-2022-48644",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48644"
},
{
"name": "CVE-2021-47217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47217"
},
{
"name": "CVE-2022-48653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48653"
},
{
"name": "CVE-2021-47214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47214"
},
{
"name": "CVE-2022-48672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48672"
},
{
"name": "CVE-2022-48657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48657"
},
{
"name": "CVE-2022-48652",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48652"
},
{
"name": "CVE-2022-48658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48658"
},
{
"name": "CVE-2021-47210",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47210"
},
{
"name": "CVE-2022-48662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48662"
},
{
"name": "CVE-2022-48639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48639"
},
{
"name": "CVE-2023-52646",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52646"
},
{
"name": "CVE-2022-48640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48640"
},
{
"name": "CVE-2024-26933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26933"
},
{
"name": "CVE-2021-47215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47215"
},
{
"name": "CVE-2021-47074",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47074"
},
{
"name": "CVE-2021-47041",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47041"
},
{
"name": "CVE-2024-27039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27039"
},
{
"name": "CVE-2022-48704",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48704"
},
{
"name": "CVE-2022-48675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48675"
},
{
"name": "CVE-2022-48690",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48690"
},
{
"name": "CVE-2021-47191",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47191"
},
{
"name": "CVE-2022-48637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48637"
},
{
"name": "CVE-2022-48632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48632"
},
{
"name": "CVE-2022-48660",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48660"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52565"
},
{
"name": "CVE-2024-26892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26892"
},
{
"name": "CVE-2024-26964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26964"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2021-47227",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47227"
},
{
"name": "CVE-2021-47237",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47237"
},
{
"name": "CVE-2021-47239",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47239"
},
{
"name": "CVE-2021-47250",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47250"
},
{
"name": "CVE-2021-47261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47261"
},
{
"name": "CVE-2021-47343",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47343"
},
{
"name": "CVE-2021-47360",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47360"
},
{
"name": "CVE-2021-47365",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47365"
},
{
"name": "CVE-2021-47373",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47373"
},
{
"name": "CVE-2021-47393",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47393"
},
{
"name": "CVE-2021-47398",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47398"
},
{
"name": "CVE-2021-47404",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47404"
},
{
"name": "CVE-2021-47420",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47420"
},
{
"name": "CVE-2021-47422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47422"
},
{
"name": "CVE-2021-47426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47426"
},
{
"name": "CVE-2021-47428",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47428"
},
{
"name": "CVE-2021-47429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47429"
},
{
"name": "CVE-2021-47430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47430"
},
{
"name": "CVE-2021-47438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47438"
},
{
"name": "CVE-2021-47444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47444"
},
{
"name": "CVE-2021-47454",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47454"
},
{
"name": "CVE-2021-47457",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47457"
},
{
"name": "CVE-2021-47465",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47465"
},
{
"name": "CVE-2021-47481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47481"
},
{
"name": "CVE-2021-47483",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47483"
},
{
"name": "CVE-2021-47490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47490"
},
{
"name": "CVE-2021-47495",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47495"
},
{
"name": "CVE-2021-47497",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47497"
},
{
"name": "CVE-2021-47499",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47499"
},
{
"name": "CVE-2021-47500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47500"
},
{
"name": "CVE-2021-47505",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47505"
},
{
"name": "CVE-2021-47516",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47516"
},
{
"name": "CVE-2021-47527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47527"
},
{
"name": "CVE-2021-47536",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47536"
},
{
"name": "CVE-2021-47537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47537"
},
{
"name": "CVE-2021-47538",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47538"
},
{
"name": "CVE-2021-47550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47550"
},
{
"name": "CVE-2021-47559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47559"
},
{
"name": "CVE-2022-48689",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48689"
},
{
"name": "CVE-2022-48691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48691"
},
{
"name": "CVE-2022-48705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48705"
},
{
"name": "CVE-2022-48709",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48709"
},
{
"name": "CVE-2022-48710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48710"
},
{
"name": "CVE-2023-52654",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52654"
},
{
"name": "CVE-2023-52659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52659"
},
{
"name": "CVE-2023-52661",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52661"
},
{
"name": "CVE-2023-52662",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52662"
},
{
"name": "CVE-2023-52679",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52679"
},
{
"name": "CVE-2023-52686",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52686"
},
{
"name": "CVE-2023-52690",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52690"
},
{
"name": "CVE-2023-52698",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52698"
},
{
"name": "CVE-2023-52702",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52702"
},
{
"name": "CVE-2023-52703",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52703"
},
{
"name": "CVE-2023-52730",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52730"
},
{
"name": "CVE-2023-52731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52731"
},
{
"name": "CVE-2023-52736",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52736"
},
{
"name": "CVE-2023-52739",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52739"
},
{
"name": "CVE-2023-52740",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52740"
},
{
"name": "CVE-2023-52743",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52743"
},
{
"name": "CVE-2023-52744",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52744"
},
{
"name": "CVE-2023-52747",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52747"
},
{
"name": "CVE-2023-52764",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52764"
},
{
"name": "CVE-2023-52781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52781"
},
{
"name": "CVE-2023-52788",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52788"
},
{
"name": "CVE-2023-52791",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52791"
},
{
"name": "CVE-2023-52795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52795"
},
{
"name": "CVE-2023-52796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52796"
},
{
"name": "CVE-2023-52803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52803"
},
{
"name": "CVE-2023-52806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52806"
},
{
"name": "CVE-2023-52814",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52814"
},
{
"name": "CVE-2023-52817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52817"
},
{
"name": "CVE-2023-52818",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52818"
},
{
"name": "CVE-2023-52833",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52833"
},
{
"name": "CVE-2023-52840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52840"
},
{
"name": "CVE-2023-52851",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52851"
},
{
"name": "CVE-2023-52854",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52854"
},
{
"name": "CVE-2023-52867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52867"
},
{
"name": "CVE-2023-52877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52877"
},
{
"name": "CVE-2024-26838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26838"
},
{
"name": "CVE-2024-35801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35801"
},
{
"name": "CVE-2024-35804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35804"
},
{
"name": "CVE-2024-35860",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35860"
},
{
"name": "CVE-2024-35872",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35872"
},
{
"name": "CVE-2024-35901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35901"
},
{
"name": "CVE-2024-35912",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35912"
},
{
"name": "CVE-2024-35952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35952"
},
{
"name": "CVE-2024-35959",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35959"
},
{
"name": "CVE-2024-35963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35963"
},
{
"name": "CVE-2024-35964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35964"
},
{
"name": "CVE-2024-36012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36012"
},
{
"name": "CVE-2024-36906",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36906"
},
{
"name": "CVE-2024-36918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36918"
},
{
"name": "CVE-2024-36926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36926"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-52663",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52663"
},
{
"name": "CVE-2023-52675",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52675"
},
{
"name": "CVE-2023-52697",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52697"
},
{
"name": "CVE-2024-26611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26611"
},
{
"name": "CVE-2024-26674",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26674"
},
{
"name": "CVE-2024-26899",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26899"
},
{
"name": "CVE-2024-26990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26990"
},
{
"name": "CVE-2024-27027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27027"
},
{
"name": "CVE-2024-27031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27031"
},
{
"name": "CVE-2024-27057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27057"
},
{
"name": "CVE-2024-35795",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35795"
},
{
"name": "CVE-2024-35810",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35810"
},
{
"name": "CVE-2024-35814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35814"
},
{
"name": "CVE-2024-35824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35824"
},
{
"name": "CVE-2024-35834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35834"
},
{
"name": "CVE-2024-35836",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35836"
},
{
"name": "CVE-2024-35838",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35838"
},
{
"name": "CVE-2024-35891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35891"
},
{
"name": "CVE-2024-35903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35903"
},
{
"name": "CVE-2024-35917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35917"
},
{
"name": "CVE-2024-35927",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35927"
},
{
"name": "CVE-2024-35974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35974"
},
{
"name": "CVE-2024-35981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35981"
},
{
"name": "CVE-2024-35991",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35991"
},
{
"name": "CVE-2024-36002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36002"
},
{
"name": "CVE-2024-36011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36011"
},
{
"name": "CVE-2024-36021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36021"
},
{
"name": "CVE-2024-36891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36891"
},
{
"name": "CVE-2024-36930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36930"
},
{
"name": "CVE-2024-36936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36936"
},
{
"name": "CVE-2024-35983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35983"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2023-52648",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52648"
},
{
"name": "CVE-2023-52649",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52649"
},
{
"name": "CVE-2024-26953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26953"
},
{
"name": "CVE-2024-26975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26975"
},
{
"name": "CVE-2024-27026",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27026"
},
{
"name": "CVE-2024-27079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27079"
},
{
"name": "CVE-2024-27390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27390"
},
{
"name": "CVE-2024-35787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35787"
},
{
"name": "CVE-2024-35827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35827"
},
{
"name": "CVE-2024-35831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35831"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-52560",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52560"
},
{
"name": "CVE-2023-52813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52813"
},
{
"name": "CVE-2023-52835",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52835"
},
{
"name": "CVE-2023-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52881"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2021-47539",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47539"
},
{
"name": "CVE-2021-47572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47572"
},
{
"name": "CVE-2021-47576",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47576"
},
{
"name": "CVE-2021-47578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47578"
},
{
"name": "CVE-2021-47601",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47601"
},
{
"name": "CVE-2021-47607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47607"
},
{
"name": "CVE-2021-47609",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47609"
},
{
"name": "CVE-2021-47616",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47616"
},
{
"name": "CVE-2021-47617",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47617"
},
{
"name": "CVE-2021-47620",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47620"
},
{
"name": "CVE-2022-48712",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48712"
},
{
"name": "CVE-2022-48713",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48713"
},
{
"name": "CVE-2022-48714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48714"
},
{
"name": "CVE-2022-48720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48720"
},
{
"name": "CVE-2022-48724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48724"
},
{
"name": "CVE-2022-48725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48725"
},
{
"name": "CVE-2022-48727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48727"
},
{
"name": "CVE-2022-48728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48728"
},
{
"name": "CVE-2022-48729",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48729"
},
{
"name": "CVE-2022-48732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48732"
},
{
"name": "CVE-2022-48745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48745"
},
{
"name": "CVE-2022-48746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48746"
},
{
"name": "CVE-2022-48752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48752"
},
{
"name": "CVE-2022-48760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48760"
},
{
"name": "CVE-2022-48763",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48763"
},
{
"name": "CVE-2022-48767",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48767"
},
{
"name": "CVE-2022-48768",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48768"
},
{
"name": "CVE-2022-48769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48769"
},
{
"name": "CVE-2022-48770",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48770"
},
{
"name": "CVE-2023-52787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52787"
},
{
"name": "CVE-2023-52837",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52837"
},
{
"name": "CVE-2023-52845",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52845"
},
{
"name": "CVE-2023-52846",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52846"
},
{
"name": "CVE-2024-35979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35979"
},
{
"name": "CVE-2024-36477",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36477"
},
{
"name": "CVE-2024-36937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36937"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-36967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36967"
},
{
"name": "CVE-2024-36975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36975"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-24859",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24859"
},
{
"name": "CVE-2024-26734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26734"
},
{
"name": "CVE-2024-26818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26818"
},
{
"name": "CVE-2024-26831",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26831"
},
{
"name": "CVE-2024-27012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27012"
},
{
"name": "CVE-2024-27017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27017"
},
{
"name": "CVE-2024-35880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35880"
},
{
"name": "CVE-2024-35892",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35892"
},
{
"name": "CVE-2024-35894",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35894"
},
{
"name": "CVE-2024-35908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35908"
},
{
"name": "CVE-2024-35913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35913"
},
{
"name": "CVE-2024-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35942"
},
{
"name": "CVE-2024-35957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35957"
},
{
"name": "CVE-2024-35980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35980"
},
{
"name": "CVE-2024-39298",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39298"
},
{
"name": "CVE-2024-39493",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39493"
},
{
"name": "CVE-2024-39500",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39500"
},
{
"name": "CVE-2024-40900",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40900"
},
{
"name": "CVE-2024-40903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40903"
},
{
"name": "CVE-2024-40908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40908"
},
{
"name": "CVE-2024-40913",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40913"
},
{
"name": "CVE-2024-40919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40919"
},
{
"name": "CVE-2024-40924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40924"
},
{
"name": "CVE-2024-40937",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40937"
},
{
"name": "CVE-2024-40940",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40940"
},
{
"name": "CVE-2024-40948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40948"
},
{
"name": "CVE-2024-40956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40956"
},
{
"name": "CVE-2024-40989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40989"
},
{
"name": "CVE-2024-40994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40994"
},
{
"name": "CVE-2023-52750",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52750"
},
{
"name": "CVE-2023-52782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52782"
},
{
"name": "CVE-2023-52786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52786"
},
{
"name": "CVE-2023-52792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52792"
},
{
"name": "CVE-2023-52794",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52794"
},
{
"name": "CVE-2023-52842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52842"
},
{
"name": "CVE-2023-52849",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52849"
},
{
"name": "CVE-2023-52866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52866"
},
{
"name": "CVE-2024-36010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36010"
},
{
"name": "CVE-2024-36882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36882"
},
{
"name": "CVE-2024-36962",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36962"
},
{
"name": "CVE-2024-36977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36977"
},
{
"name": "CVE-2024-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38566"
},
{
"name": "CVE-2024-38629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38629"
},
{
"name": "CVE-2024-39291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39291"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36028",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36028"
},
{
"name": "CVE-2024-36884",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36884"
},
{
"name": "CVE-2024-36920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36920"
},
{
"name": "CVE-2024-36932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36932"
},
{
"name": "CVE-2024-36956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36956"
},
{
"name": "CVE-2024-36961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36961"
},
{
"name": "CVE-2024-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38561"
},
{
"name": "CVE-2024-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38604"
},
{
"name": "CVE-2024-38606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38606"
},
{
"name": "CVE-2021-47579",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47579"
},
{
"name": "CVE-2022-48757",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48757"
},
{
"name": "CVE-2023-52775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52775"
},
{
"name": "CVE-2023-52885",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52885"
},
{
"name": "CVE-2024-26837",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26837"
},
{
"name": "CVE-2024-27404",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27404"
},
{
"name": "CVE-2024-39479",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39479"
},
{
"name": "CVE-2024-39498",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39498"
},
{
"name": "CVE-2024-40923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40923"
},
{
"name": "CVE-2024-40925",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40925"
},
{
"name": "CVE-2024-6197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6197"
},
{
"name": "CVE-2021-47623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47623"
},
{
"name": "CVE-2022-48773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48773"
},
{
"name": "CVE-2022-48778",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48778"
},
{
"name": "CVE-2022-48780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48780"
},
{
"name": "CVE-2022-48783",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48783"
},
{
"name": "CVE-2022-48784",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48784"
},
{
"name": "CVE-2022-48785",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48785"
},
{
"name": "CVE-2022-48786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48786"
},
{
"name": "CVE-2022-48787",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48787"
},
{
"name": "CVE-2022-48793",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48793"
},
{
"name": "CVE-2022-48796",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48796"
},
{
"name": "CVE-2022-48797",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48797"
},
{
"name": "CVE-2022-48799",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48799"
},
{
"name": "CVE-2022-48800",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48800"
},
{
"name": "CVE-2022-48801",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48801"
},
{
"name": "CVE-2022-48802",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48802"
},
{
"name": "CVE-2022-48804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48804"
},
{
"name": "CVE-2022-48806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48806"
},
{
"name": "CVE-2022-48809",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48809"
},
{
"name": "CVE-2022-48810",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48810"
},
{
"name": "CVE-2022-48812",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48812"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-59425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59425"
},
{
"name": "CVE-2022-48813",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48813"
},
{
"name": "CVE-2022-48815",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48815"
},
{
"name": "CVE-2022-48817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48817"
},
{
"name": "CVE-2022-48818",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48818"
},
{
"name": "CVE-2022-48823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48823"
},
{
"name": "CVE-2022-48825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48825"
},
{
"name": "CVE-2022-48830",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48830"
},
{
"name": "CVE-2022-48831",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48831"
},
{
"name": "CVE-2022-48834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48834"
},
{
"name": "CVE-2022-48835",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48835"
},
{
"name": "CVE-2022-48836",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48836"
},
{
"name": "CVE-2022-48837",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48837"
},
{
"name": "CVE-2022-48839",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48839"
},
{
"name": "CVE-2022-48840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48840"
},
{
"name": "CVE-2022-48843",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48843"
},
{
"name": "CVE-2022-48850",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48850"
},
{
"name": "CVE-2022-48853",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48853"
},
{
"name": "CVE-2022-48858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48858"
},
{
"name": "CVE-2022-48861",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48861"
},
{
"name": "CVE-2022-48863",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48863"
},
{
"name": "CVE-2022-48864",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48864"
},
{
"name": "CVE-2022-48866",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48866"
},
{
"name": "CVE-2023-52886",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52886"
},
{
"name": "CVE-2024-41057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41057"
},
{
"name": "CVE-2024-41058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41058"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2024-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38632"
},
{
"name": "CVE-2024-39491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39491"
},
{
"name": "CVE-2024-40922",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40922"
},
{
"name": "CVE-2024-40930",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40930"
},
{
"name": "CVE-2024-40964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40964"
},
{
"name": "CVE-2024-40992",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40992"
},
{
"name": "CVE-2024-41003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41003"
},
{
"name": "CVE-2024-41047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41047"
},
{
"name": "CVE-2024-42085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42085"
},
{
"name": "CVE-2024-42109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42109"
},
{
"name": "CVE-2024-42240",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42240"
},
{
"name": "CVE-2021-47517",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47517"
},
{
"name": "CVE-2022-48865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48865"
},
{
"name": "CVE-2022-48875",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48875"
},
{
"name": "CVE-2022-48883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48883"
},
{
"name": "CVE-2022-48886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48886"
},
{
"name": "CVE-2022-48889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48889"
},
{
"name": "CVE-2022-48890",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48890"
},
{
"name": "CVE-2022-48896",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48896"
},
{
"name": "CVE-2022-48899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48899"
},
{
"name": "CVE-2022-48912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48912"
},
{
"name": "CVE-2022-48913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48913"
},
{
"name": "CVE-2022-48914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48914"
},
{
"name": "CVE-2022-48915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48915"
},
{
"name": "CVE-2022-48921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48921"
},
{
"name": "CVE-2022-48929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48929"
},
{
"name": "CVE-2022-48931",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48931"
},
{
"name": "CVE-2022-48934",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48934"
},
{
"name": "CVE-2022-48938",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48938"
},
{
"name": "CVE-2022-48939",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48939"
},
{
"name": "CVE-2022-48942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48942"
},
{
"name": "CVE-2023-52859",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52859"
},
{
"name": "CVE-2023-52898",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52898"
},
{
"name": "CVE-2023-52901",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52901"
},
{
"name": "CVE-2023-52905",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52905"
},
{
"name": "CVE-2023-52906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52906"
},
{
"name": "CVE-2023-52908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52908"
},
{
"name": "CVE-2023-52909",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52909"
},
{
"name": "CVE-2023-52910",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52910"
},
{
"name": "CVE-2024-26637",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26637"
},
{
"name": "CVE-2024-26682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26682"
},
{
"name": "CVE-2024-26683",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26683"
},
{
"name": "CVE-2024-36970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36970"
},
{
"name": "CVE-2024-39486",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39486"
},
{
"name": "CVE-2024-41010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41010"
},
{
"name": "CVE-2024-41032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41032"
},
{
"name": "CVE-2024-41037",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41037"
},
{
"name": "CVE-2024-41038",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41038"
},
{
"name": "CVE-2024-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41039"
},
{
"name": "CVE-2024-41045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41045"
},
{
"name": "CVE-2024-41056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41056"
},
{
"name": "CVE-2024-41084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41084"
},
{
"name": "CVE-2024-41094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41094"
},
{
"name": "CVE-2024-42107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42107"
},
{
"name": "CVE-2024-42125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42125"
},
{
"name": "CVE-2024-42132",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42132"
},
{
"name": "CVE-2024-42133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42133"
},
{
"name": "CVE-2024-42138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42138"
},
{
"name": "CVE-2024-42139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42139"
},
{
"name": "CVE-2024-42141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42141"
},
{
"name": "CVE-2024-42238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42238"
},
{
"name": "CVE-2024-42239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42239"
},
{
"name": "CVE-2024-42241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42241"
},
{
"name": "CVE-2024-42245",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42245"
},
{
"name": "CVE-2024-42268",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42268"
},
{
"name": "CVE-2024-42278",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42278"
},
{
"name": "CVE-2024-42291",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42291"
},
{
"name": "CVE-2024-42315",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42315"
},
{
"name": "CVE-2024-42316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42316"
},
{
"name": "CVE-2024-43816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43816"
},
{
"name": "CVE-2024-43817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43817"
},
{
"name": "CVE-2024-43821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43821"
},
{
"name": "CVE-2024-43826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43826"
},
{
"name": "CVE-2024-43840",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43840"
},
{
"name": "CVE-2024-43842",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43842"
},
{
"name": "CVE-2024-43873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43873"
},
{
"name": "CVE-2024-43874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43874"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-41031",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41031"
},
{
"name": "CVE-2024-42243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42243"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-44983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44983"
},
{
"name": "CVE-2024-44986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44986"
},
{
"name": "CVE-2024-45000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45000"
},
{
"name": "CVE-2024-45010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45010"
},
{
"name": "CVE-2024-45019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45019"
},
{
"name": "CVE-2024-45022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45022"
},
{
"name": "CVE-2024-45029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45029"
},
{
"name": "CVE-2024-46711",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46711"
},
{
"name": "CVE-2024-46784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46784"
},
{
"name": "CVE-2024-46830",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46830"
},
{
"name": "CVE-2022-48944",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48944"
},
{
"name": "CVE-2024-42294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42294"
},
{
"name": "CVE-2024-43870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43870"
},
{
"name": "CVE-2024-44967",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44967"
},
{
"name": "CVE-2024-44984",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44984"
},
{
"name": "CVE-2024-45001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45001"
},
{
"name": "CVE-2024-45005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45005"
},
{
"name": "CVE-2024-45012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45012"
},
{
"name": "CVE-2024-45013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45013"
},
{
"name": "CVE-2024-45017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45017"
},
{
"name": "CVE-2024-45020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45020"
},
{
"name": "CVE-2024-46672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46672"
},
{
"name": "CVE-2024-46692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46692"
},
{
"name": "CVE-2024-46706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46706"
},
{
"name": "CVE-2024-46709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46709"
},
{
"name": "CVE-2024-46710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46710"
},
{
"name": "CVE-2024-46767",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46767"
},
{
"name": "CVE-2024-46786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46786"
},
{
"name": "CVE-2024-46797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46797"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-41085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41085"
},
{
"name": "CVE-2024-26721",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26721"
},
{
"name": "CVE-2024-42258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42258"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2012-2114",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2114"
},
{
"name": "CVE-2021-46937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46937"
},
{
"name": "CVE-2021-46999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46999"
},
{
"name": "CVE-2021-47033",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47033"
},
{
"name": "CVE-2021-47079",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47079"
},
{
"name": "CVE-2021-47092",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47092"
},
{
"name": "CVE-2021-47226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47226"
},
{
"name": "CVE-2021-47251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47251"
},
{
"name": "CVE-2021-47266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47266"
},
{
"name": "CVE-2021-47318",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47318"
},
{
"name": "CVE-2021-47325",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47325"
},
{
"name": "CVE-2021-47346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47346"
},
{
"name": "CVE-2021-47349",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47349"
},
{
"name": "CVE-2021-47519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47519"
},
{
"name": "CVE-2021-47561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47561"
},
{
"name": "CVE-2021-47613",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47613"
},
{
"name": "CVE-2022-1247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1247"
},
{
"name": "CVE-2022-20153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-20153"
},
{
"name": "CVE-2022-48641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48641"
},
{
"name": "CVE-2022-48643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48643"
},
{
"name": "CVE-2022-48707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48707"
},
{
"name": "CVE-2022-48719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48719"
},
{
"name": "CVE-2022-48781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48781"
},
{
"name": "CVE-2022-48819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48819"
},
{
"name": "CVE-2022-48832",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48832"
},
{
"name": "CVE-2022-48848",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48848"
},
{
"name": "CVE-2022-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48876"
},
{
"name": "CVE-2022-48963",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48963"
},
{
"name": "CVE-2022-48974",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48974"
},
{
"name": "CVE-2022-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48976"
},
{
"name": "CVE-2022-48984",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48984"
},
{
"name": "CVE-2022-48986",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48986"
},
{
"name": "CVE-2022-49013",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49013"
},
{
"name": "CVE-2022-49018",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49018"
},
{
"name": "CVE-2022-49048",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49048"
},
{
"name": "CVE-2022-49049",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49049"
},
{
"name": "CVE-2022-49052",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49052"
},
{
"name": "CVE-2022-49072",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49072"
},
{
"name": "CVE-2022-49077",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49077"
},
{
"name": "CVE-2022-49094",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49094"
},
{
"name": "CVE-2022-49152",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49152"
},
{
"name": "CVE-2022-49198",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49198"
},
{
"name": "CVE-2022-49229",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49229"
},
{
"name": "CVE-2022-49231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49231"
},
{
"name": "CVE-2022-49334",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49334"
},
{
"name": "CVE-2022-49340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49340"
},
{
"name": "CVE-2022-49374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49374"
},
{
"name": "CVE-2022-49401",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49401"
},
{
"name": "CVE-2022-49403",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49403"
},
{
"name": "CVE-2022-49450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49450"
},
{
"name": "CVE-2022-49554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49554"
},
{
"name": "CVE-2022-49557",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49557"
},
{
"name": "CVE-2022-49567",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49567"
},
{
"name": "CVE-2022-49571",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49571"
},
{
"name": "CVE-2022-49572",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49572"
},
{
"name": "CVE-2022-49573",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49573"
},
{
"name": "CVE-2022-49574",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49574"
},
{
"name": "CVE-2022-49575",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49575"
},
{
"name": "CVE-2022-49577",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49577"
},
{
"name": "CVE-2022-49580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49580"
},
{
"name": "CVE-2022-49585",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49585"
},
{
"name": "CVE-2022-49586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49586"
},
{
"name": "CVE-2022-49587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49587"
},
{
"name": "CVE-2022-49593",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49593"
},
{
"name": "CVE-2022-49594",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49594"
},
{
"name": "CVE-2022-49595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49595"
},
{
"name": "CVE-2022-49596",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49596"
},
{
"name": "CVE-2022-49597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49597"
},
{
"name": "CVE-2022-49598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49598"
},
{
"name": "CVE-2022-49599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49599"
},
{
"name": "CVE-2022-49600",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49600"
},
{
"name": "CVE-2022-49601",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49601"
},
{
"name": "CVE-2022-49602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49602"
},
{
"name": "CVE-2022-49604",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49604"
},
{
"name": "CVE-2022-49612",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49612"
},
{
"name": "CVE-2022-49629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49629"
},
{
"name": "CVE-2022-49633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49633"
},
{
"name": "CVE-2022-49637",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49637"
},
{
"name": "CVE-2022-49639",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49639"
},
{
"name": "CVE-2022-49659",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49659"
},
{
"name": "CVE-2022-49662",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49662"
},
{
"name": "CVE-2022-49691",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49691"
},
{
"name": "CVE-2022-49744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49744"
},
{
"name": "CVE-2022-49747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49747"
},
{
"name": "CVE-2022-49752",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49752"
},
{
"name": "CVE-2022-49754",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49754"
},
{
"name": "CVE-2022-49760",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49760"
},
{
"name": "CVE-2023-31082",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31082"
},
{
"name": "CVE-2023-52516",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52516"
},
{
"name": "CVE-2023-52568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52568"
},
{
"name": "CVE-2023-52570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52570"
},
{
"name": "CVE-2023-52689",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52689"
},
{
"name": "CVE-2023-52704",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52704"
},
{
"name": "CVE-2023-52706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52706"
},
{
"name": "CVE-2023-52828",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52828"
},
{
"name": "CVE-2023-52902",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52902"
},
{
"name": "CVE-2023-52932",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52932"
},
{
"name": "CVE-2023-52934",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52934"
},
{
"name": "CVE-2023-52940",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52940"
},
{
"name": "CVE-2023-52942",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52942"
},
{
"name": "CVE-2023-52977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52977"
},
{
"name": "CVE-2023-52985",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52985"
},
{
"name": "CVE-2023-52987",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52987"
},
{
"name": "CVE-2023-52991",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52991"
},
{
"name": "CVE-2023-53004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53004"
},
{
"name": "CVE-2023-53017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53017"
},
{
"name": "CVE-2024-23196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23196"
},
{
"name": "CVE-2024-26678",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26678"
},
{
"name": "CVE-2024-26725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26725"
},
{
"name": "CVE-2024-26746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26746"
},
{
"name": "CVE-2024-26918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26918"
},
{
"name": "CVE-2024-27023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27023"
},
{
"name": "CVE-2024-40907",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40907"
},
{
"name": "CVE-2024-43896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43896"
},
{
"name": "CVE-2024-46748",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46748"
},
{
"name": "CVE-2024-46862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46862"
},
{
"name": "CVE-2024-53073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53073"
},
{
"name": "CVE-2024-53225",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53225"
},
{
"name": "CVE-2024-56668",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56668"
},
{
"name": "CVE-2024-57852",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57852"
},
{
"name": "CVE-2024-57914",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57914"
},
{
"name": "CVE-2024-57985",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57985"
},
{
"name": "CVE-2024-57989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57989"
},
{
"name": "CVE-2024-58064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58064"
},
{
"name": "CVE-2024-58075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58075"
},
{
"name": "CVE-2024-58084",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58084"
},
{
"name": "CVE-2025-21709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21709"
},
{
"name": "CVE-2025-21807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21807"
},
{
"name": "CVE-2025-21817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21817"
},
{
"name": "CVE-2025-21827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21827"
},
{
"name": "CVE-2025-21851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21851"
},
{
"name": "CVE-2025-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21874"
},
{
"name": "CVE-2025-21907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21907"
},
{
"name": "CVE-2025-21921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21921"
},
{
"name": "CVE-2025-24357",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24357"
},
{
"name": "CVE-2025-25183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25183"
},
{
"name": "CVE-2025-29770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29770"
},
{
"name": "CVE-2025-30165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30165"
},
{
"name": "CVE-2025-30202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30202"
},
{
"name": "CVE-2025-32381",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32381"
},
{
"name": "CVE-2025-32444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32444"
},
{
"name": "CVE-2025-46570",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46570"
},
{
"name": "CVE-2025-47277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47277"
},
{
"name": "CVE-2025-48887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48887"
},
{
"name": "CVE-2025-48956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48956"
},
{
"name": "CVE-2025-57809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57809"
},
{
"name": "CVE-2025-62372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62372"
},
{
"name": "CVE-2025-62426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62426"
},
{
"name": "CVE-2025-65106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65106"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2022-48879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48879"
},
{
"name": "CVE-2022-48946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48946"
},
{
"name": "CVE-2022-48951",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48951"
},
{
"name": "CVE-2022-48953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48953"
},
{
"name": "CVE-2022-48969",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48969"
},
{
"name": "CVE-2022-48971",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48971"
},
{
"name": "CVE-2022-48972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48972"
},
{
"name": "CVE-2022-48978",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48978"
},
{
"name": "CVE-2022-48981",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48981"
},
{
"name": "CVE-2022-48985",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48985"
},
{
"name": "CVE-2022-48987",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48987"
},
{
"name": "CVE-2022-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48988"
},
{
"name": "CVE-2022-48992",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48992"
},
{
"name": "CVE-2022-48994",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48994"
},
{
"name": "CVE-2022-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48997"
},
{
"name": "CVE-2022-49005",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49005"
},
{
"name": "CVE-2022-49006",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49006"
},
{
"name": "CVE-2022-49011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49011"
},
{
"name": "CVE-2022-49012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49012"
},
{
"name": "CVE-2022-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49014"
},
{
"name": "CVE-2022-49015",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49015"
},
{
"name": "CVE-2022-49017",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49017"
},
{
"name": "CVE-2022-49021",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49021"
},
{
"name": "CVE-2022-49022",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49022"
},
{
"name": "CVE-2022-49024",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49024"
},
{
"name": "CVE-2022-49027",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49027"
},
{
"name": "CVE-2022-49028",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49028"
},
{
"name": "CVE-2022-49029",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49029"
},
{
"name": "CVE-2024-44932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44932"
},
{
"name": "CVE-2024-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44964"
},
{
"name": "CVE-2024-46766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46766"
},
{
"name": "CVE-2024-46825",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46825"
},
{
"name": "CVE-2024-46864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46864"
},
{
"name": "CVE-2024-43869",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43869"
},
{
"name": "CVE-2024-47672",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47672"
},
{
"name": "CVE-2024-47675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47675"
},
{
"name": "CVE-2024-47682",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47682"
},
{
"name": "CVE-2024-47687",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47687"
},
{
"name": "CVE-2024-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47696"
},
{
"name": "CVE-2024-47702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47702"
},
{
"name": "CVE-2024-47715",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47715"
},
{
"name": "CVE-2024-47719",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47719"
},
{
"name": "CVE-2024-47727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47727"
},
{
"name": "CVE-2024-49855",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49855"
},
{
"name": "CVE-2024-49862",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49862"
},
{
"name": "CVE-2024-49864",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49864"
},
{
"name": "CVE-2024-49866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49866"
},
{
"name": "CVE-2024-49870",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49870"
},
{
"name": "CVE-2024-49886",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49886"
},
{
"name": "CVE-2024-49946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49946"
},
{
"name": "CVE-2024-49953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49953"
},
{
"name": "CVE-2024-50000",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50000"
},
{
"name": "CVE-2024-50019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50019"
},
{
"name": "CVE-2024-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50020"
},
{
"name": "CVE-2024-50021",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50021"
},
{
"name": "CVE-2024-50022",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50022"
},
{
"name": "CVE-2024-50023",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50023"
},
{
"name": "CVE-2024-50027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50027"
},
{
"name": "CVE-2024-50041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50041"
},
{
"name": "CVE-2024-50042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50042"
},
{
"name": "CVE-2024-50060",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50060"
},
{
"name": "CVE-2024-50064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50064"
},
{
"name": "CVE-2024-50074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50074"
},
{
"name": "CVE-2024-50075",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50075"
},
{
"name": "CVE-2024-50076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50076"
},
{
"name": "CVE-2024-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50077"
},
{
"name": "CVE-2024-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50078"
},
{
"name": "CVE-2024-50081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50081"
},
{
"name": "CVE-2024-46824",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46824"
},
{
"name": "CVE-2024-50126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50126"
},
{
"name": "CVE-2024-50215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50215"
},
{
"name": "CVE-2024-50235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50235"
},
{
"name": "CVE-2024-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50250"
},
{
"name": "CVE-2024-50252",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50252"
},
{
"name": "CVE-2024-50255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50255"
},
{
"name": "CVE-2024-50259",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50259"
},
{
"name": "CVE-2024-50261",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50261"
},
{
"name": "CVE-2024-50271",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50271"
},
{
"name": "CVE-2024-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53042"
},
{
"name": "CVE-2024-53055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53055"
},
{
"name": "CVE-2024-53070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53070"
},
{
"name": "CVE-2024-53072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53072"
},
{
"name": "CVE-2024-53082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53082"
},
{
"name": "CVE-2024-50226",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50226"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-44994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44994"
},
{
"name": "CVE-2024-50110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50110"
},
{
"name": "CVE-2024-42317",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42317"
},
{
"name": "CVE-2024-43820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43820"
},
{
"name": "CVE-2024-43888",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43888"
},
{
"name": "CVE-2024-43910",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43910"
},
{
"name": "CVE-2024-44975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44975"
},
{
"name": "CVE-2024-44996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44996"
},
{
"name": "CVE-2024-45027",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45027"
},
{
"name": "CVE-2024-46697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46697"
},
{
"name": "CVE-2024-46698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46698"
},
{
"name": "CVE-2024-46788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46788"
},
{
"name": "CVE-2024-46793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46793"
},
{
"name": "CVE-2024-46845",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46845"
},
{
"name": "CVE-2024-47734",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47734"
},
{
"name": "CVE-2024-49856",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49856"
},
{
"name": "CVE-2024-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49977"
},
{
"name": "CVE-2024-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50093"
},
{
"name": "CVE-2024-50186",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50186"
},
{
"name": "CVE-2024-50189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50189"
},
{
"name": "CVE-2022-48982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48982"
},
{
"name": "CVE-2022-48983",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48983"
},
{
"name": "CVE-2022-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48989"
},
{
"name": "CVE-2023-52778",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52778"
},
{
"name": "CVE-2024-49976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49976"
},
{
"name": "CVE-2024-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50101"
},
{
"name": "CVE-2024-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50102"
},
{
"name": "CVE-2024-50121",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50121"
},
{
"name": "CVE-2024-50124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50124"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-50128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50128"
},
{
"name": "CVE-2024-50136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50136"
},
{
"name": "CVE-2024-50139",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50139"
},
{
"name": "CVE-2024-50141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50141"
},
{
"name": "CVE-2024-50145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50145"
},
{
"name": "CVE-2024-50146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50146"
},
{
"name": "CVE-2024-50147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50147"
},
{
"name": "CVE-2024-50153",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50153"
},
{
"name": "CVE-2024-50155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50155"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2024-50158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50158"
},
{
"name": "CVE-2024-50160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50160"
},
{
"name": "CVE-2024-50169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50169"
},
{
"name": "CVE-2024-50172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50172"
},
{
"name": "CVE-2024-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50182"
},
{
"name": "CVE-2024-50200",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50200"
},
{
"name": "CVE-2024-50216",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50216"
},
{
"name": "CVE-2024-50274",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50274"
},
{
"name": "CVE-2024-50275",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50275"
},
{
"name": "CVE-2024-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53045"
},
{
"name": "CVE-2024-53048",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53048"
},
{
"name": "CVE-2024-53074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53074"
},
{
"name": "CVE-2024-53085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53085"
},
{
"name": "CVE-2024-53110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53110"
},
{
"name": "CVE-2024-50162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50162"
},
{
"name": "CVE-2024-50163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50163"
},
{
"name": "CVE-2024-53097",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53097"
},
{
"name": "CVE-2024-53113",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53113"
},
{
"name": "CVE-2024-53120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53120"
},
{
"name": "CVE-2024-53123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53123"
},
{
"name": "CVE-2024-53136",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53136"
},
{
"name": "CVE-2024-53064",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53064"
},
{
"name": "CVE-2024-53105",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53105"
},
{
"name": "CVE-2024-53117",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53117"
},
{
"name": "CVE-2024-53118",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53118"
},
{
"name": "CVE-2024-53134",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53134"
},
{
"name": "CVE-2024-53151",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53151"
},
{
"name": "CVE-2024-53160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53160"
},
{
"name": "CVE-2024-53166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53166"
},
{
"name": "CVE-2024-53169",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53169"
},
{
"name": "CVE-2024-53202",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53202"
},
{
"name": "CVE-2024-53206",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53206"
},
{
"name": "CVE-2024-53207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53207"
},
{
"name": "CVE-2024-53208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53208"
},
{
"name": "CVE-2024-53213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53213"
},
{
"name": "CVE-2024-53215",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53215"
},
{
"name": "CVE-2024-53222",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53222"
},
{
"name": "CVE-2024-53229",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53229"
},
{
"name": "CVE-2024-56549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56549"
},
{
"name": "CVE-2024-56667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56667"
},
{
"name": "CVE-2024-56752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56752"
},
{
"name": "CVE-2024-48873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48873"
},
{
"name": "CVE-2024-49951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49951"
},
{
"name": "CVE-2024-53091",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53091"
},
{
"name": "CVE-2024-53170",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53170"
},
{
"name": "CVE-2024-53175",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53175"
},
{
"name": "CVE-2024-53185",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53185"
},
{
"name": "CVE-2024-53230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53230"
},
{
"name": "CVE-2024-53231",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53231"
},
{
"name": "CVE-2024-53232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53232"
},
{
"name": "CVE-2024-53236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53236"
},
{
"name": "CVE-2024-55881",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55881"
},
{
"name": "CVE-2024-56372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56372"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-53238",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53238"
},
{
"name": "CVE-2024-56617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56617"
},
{
"name": "CVE-2024-56625",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56625"
},
{
"name": "CVE-2024-56632",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56632"
},
{
"name": "CVE-2024-56654",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56654"
},
{
"name": "CVE-2024-56663",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56663"
},
{
"name": "CVE-2024-56675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56675"
},
{
"name": "CVE-2024-56708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56708"
},
{
"name": "CVE-2024-56709",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56709"
},
{
"name": "CVE-2024-56729",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56729"
},
{
"name": "CVE-2024-56745",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56745"
},
{
"name": "CVE-2024-56760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56760"
},
{
"name": "CVE-2024-56765",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56765"
},
{
"name": "CVE-2024-57793",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57793"
},
{
"name": "CVE-2024-57804",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57804"
},
{
"name": "CVE-2024-57932",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57932"
},
{
"name": "CVE-2024-57933",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57933"
},
{
"name": "CVE-2024-57936",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57936"
},
{
"name": "CVE-2025-21645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21645"
},
{
"name": "CVE-2025-21649",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21649"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-46820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46820"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-53047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53047"
},
{
"name": "CVE-2024-56679",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56679"
},
{
"name": "CVE-2024-56707",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56707"
},
{
"name": "CVE-2024-56725",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56725"
},
{
"name": "CVE-2024-56726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56726"
},
{
"name": "CVE-2024-56727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56727"
},
{
"name": "CVE-2024-57882",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57882"
},
{
"name": "CVE-2024-57917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57917"
},
{
"name": "CVE-2025-21663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21663"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2024-50164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50164"
},
{
"name": "CVE-2025-21647",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21647"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-21671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21671"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2021-47222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47222"
},
{
"name": "CVE-2021-47223",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47223"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2024-47700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47700"
},
{
"name": "CVE-2024-49880",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49880"
},
{
"name": "CVE-2024-49885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49885"
},
{
"name": "CVE-2024-49999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49999"
},
{
"name": "CVE-2024-50029",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50029"
},
{
"name": "CVE-2024-50107",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50107"
},
{
"name": "CVE-2024-50109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50109"
},
{
"name": "CVE-2024-50114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50114"
},
{
"name": "CVE-2024-50120",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50120"
},
{
"name": "CVE-2024-50152",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50152"
},
{
"name": "CVE-2024-50165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50165"
},
{
"name": "CVE-2024-50197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50197"
},
{
"name": "CVE-2024-50207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50207"
},
{
"name": "CVE-2024-50223",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50223"
},
{
"name": "CVE-2024-50294",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50294"
},
{
"name": "CVE-2024-50303",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50303"
},
{
"name": "CVE-2024-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53044"
},
{
"name": "CVE-2024-53109",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53109"
},
{
"name": "CVE-2024-53167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53167"
},
{
"name": "CVE-2024-53176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53176"
},
{
"name": "CVE-2024-53178",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53178"
},
{
"name": "CVE-2024-53189",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53189"
},
{
"name": "CVE-2024-56535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56535"
},
{
"name": "CVE-2024-56545",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56545"
},
{
"name": "CVE-2024-56696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56696"
},
{
"name": "CVE-2024-56702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56702"
},
{
"name": "CVE-2024-56742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56742"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-56783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56783"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2022-49080",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49080"
},
{
"name": "CVE-2022-49089",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49089"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2021-47648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47648"
},
{
"name": "CVE-2021-47649",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47649"
},
{
"name": "CVE-2021-47650",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47650"
},
{
"name": "CVE-2021-47659",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47659"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2022-49061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49061"
},
{
"name": "CVE-2022-49065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49065"
},
{
"name": "CVE-2022-49066",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49066"
},
{
"name": "CVE-2022-49074",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49074"
},
{
"name": "CVE-2022-49086",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49086"
},
{
"name": "CVE-2022-49090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49090"
},
{
"name": "CVE-2022-49092",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49092"
},
{
"name": "CVE-2022-49097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49097"
},
{
"name": "CVE-2022-49100",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49100"
},
{
"name": "CVE-2022-49103",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49103"
},
{
"name": "CVE-2022-49107",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49107"
},
{
"name": "CVE-2022-49118",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49118"
},
{
"name": "CVE-2022-49122",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49122"
},
{
"name": "CVE-2022-49130",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49130"
},
{
"name": "CVE-2022-49145",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49145"
},
{
"name": "CVE-2022-49147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49147"
},
{
"name": "CVE-2022-49148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49148"
},
{
"name": "CVE-2022-49153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49153"
},
{
"name": "CVE-2022-49154",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49154"
},
{
"name": "CVE-2022-49155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49155"
},
{
"name": "CVE-2022-49156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49156"
},
{
"name": "CVE-2022-49159",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49159"
},
{
"name": "CVE-2022-49174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49174"
},
{
"name": "CVE-2022-49175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49175"
},
{
"name": "CVE-2022-49180",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49180"
},
{
"name": "CVE-2022-49187",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49187"
},
{
"name": "CVE-2022-49188",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49188"
},
{
"name": "CVE-2022-49206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49206"
},
{
"name": "CVE-2022-49208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49208"
},
{
"name": "CVE-2022-49216",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49216"
},
{
"name": "CVE-2022-49227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49227"
},
{
"name": "CVE-2022-49257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49257"
},
{
"name": "CVE-2022-49259",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49259"
},
{
"name": "CVE-2022-49262",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49262"
},
{
"name": "CVE-2022-49263",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49263"
},
{
"name": "CVE-2022-49264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49264"
},
{
"name": "CVE-2022-49266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49266"
},
{
"name": "CVE-2022-49268",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49268"
},
{
"name": "CVE-2022-49269",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49269"
},
{
"name": "CVE-2022-49272",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49272"
},
{
"name": "CVE-2022-49273",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49273"
},
{
"name": "CVE-2022-49279",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49279"
},
{
"name": "CVE-2022-49286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49286"
},
{
"name": "CVE-2022-49290",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49290"
},
{
"name": "CVE-2022-49297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49297"
},
{
"name": "CVE-2022-49307",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49307"
},
{
"name": "CVE-2022-49308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49308"
},
{
"name": "CVE-2022-49321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49321"
},
{
"name": "CVE-2022-49322",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49322"
},
{
"name": "CVE-2022-49323",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49323"
},
{
"name": "CVE-2022-49339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49339"
},
{
"name": "CVE-2022-49341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49341"
},
{
"name": "CVE-2022-49343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49343"
},
{
"name": "CVE-2022-49345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49345"
},
{
"name": "CVE-2022-49350",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49350"
},
{
"name": "CVE-2022-49352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49352"
},
{
"name": "CVE-2022-49356",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49356"
},
{
"name": "CVE-2022-49357",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49357"
},
{
"name": "CVE-2022-49376",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49376"
},
{
"name": "CVE-2022-49378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49378"
},
{
"name": "CVE-2022-49379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49379"
},
{
"name": "CVE-2022-49384",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49384"
},
{
"name": "CVE-2022-49394",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49394"
},
{
"name": "CVE-2022-49400",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49400"
},
{
"name": "CVE-2022-49402",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49402"
},
{
"name": "CVE-2022-49404",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49404"
},
{
"name": "CVE-2022-49407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49407"
},
{
"name": "CVE-2022-49409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49409"
},
{
"name": "CVE-2022-49422",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49422"
},
{
"name": "CVE-2022-49432",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49432"
},
{
"name": "CVE-2022-49433",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49433"
},
{
"name": "CVE-2022-49434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49434"
},
{
"name": "CVE-2022-49441",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49441"
},
{
"name": "CVE-2022-49447",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49447"
},
{
"name": "CVE-2022-49455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49455"
},
{
"name": "CVE-2022-49468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49468"
},
{
"name": "CVE-2022-49472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49472"
},
{
"name": "CVE-2022-49475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49475"
},
{
"name": "CVE-2022-49481",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49481"
},
{
"name": "CVE-2022-49486",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49486"
},
{
"name": "CVE-2022-49492",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49492"
},
{
"name": "CVE-2022-49498",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49498"
},
{
"name": "CVE-2022-49503",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49503"
},
{
"name": "CVE-2022-49508",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49508"
},
{
"name": "CVE-2022-49515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49515"
},
{
"name": "CVE-2022-49519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49519"
},
{
"name": "CVE-2022-49520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49520"
},
{
"name": "CVE-2022-49521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49521"
},
{
"name": "CVE-2022-49523",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49523"
},
{
"name": "CVE-2022-49526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49526"
},
{
"name": "CVE-2022-49532",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49532"
},
{
"name": "CVE-2022-49545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49545"
},
{
"name": "CVE-2022-49559",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49559"
},
{
"name": "CVE-2022-49581",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49581"
},
{
"name": "CVE-2022-49583",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49583"
},
{
"name": "CVE-2022-49584",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49584"
},
{
"name": "CVE-2022-49592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49592"
},
{
"name": "CVE-2022-49603",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49603"
},
{
"name": "CVE-2022-49605",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49605"
},
{
"name": "CVE-2022-49606",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49606"
},
{
"name": "CVE-2022-49607",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49607"
},
{
"name": "CVE-2022-49611",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49611"
},
{
"name": "CVE-2022-49613",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49613"
},
{
"name": "CVE-2022-49625",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49625"
},
{
"name": "CVE-2022-49627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49627"
},
{
"name": "CVE-2022-49631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49631"
},
{
"name": "CVE-2022-49634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49634"
},
{
"name": "CVE-2022-49640",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49640"
},
{
"name": "CVE-2022-49641",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49641"
},
{
"name": "CVE-2022-49642",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49642"
},
{
"name": "CVE-2022-49643",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49643"
},
{
"name": "CVE-2022-49646",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49646"
},
{
"name": "CVE-2022-49648",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49648"
},
{
"name": "CVE-2022-49653",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49653"
},
{
"name": "CVE-2022-49656",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49656"
},
{
"name": "CVE-2022-49657",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49657"
},
{
"name": "CVE-2022-49663",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49663"
},
{
"name": "CVE-2022-49670",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49670"
},
{
"name": "CVE-2022-49671",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49671"
},
{
"name": "CVE-2022-49672",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49672"
},
{
"name": "CVE-2022-49673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49673"
},
{
"name": "CVE-2022-49674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49674"
},
{
"name": "CVE-2022-49675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49675"
},
{
"name": "CVE-2022-49679",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49679"
},
{
"name": "CVE-2022-49688",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49688"
},
{
"name": "CVE-2022-49699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49699"
},
{
"name": "CVE-2022-49707",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49707"
},
{
"name": "CVE-2022-49708",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49708"
},
{
"name": "CVE-2022-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49710"
},
{
"name": "CVE-2022-49716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49716"
},
{
"name": "CVE-2022-49721",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49721"
},
{
"name": "CVE-2022-49723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49723"
},
{
"name": "CVE-2022-49726",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49726"
},
{
"name": "CVE-2022-49731",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49731"
},
{
"name": "CVE-2024-48876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48876"
},
{
"name": "CVE-2024-53681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53681"
},
{
"name": "CVE-2024-54460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54460"
},
{
"name": "CVE-2024-55642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55642"
},
{
"name": "CVE-2024-56613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56613"
},
{
"name": "CVE-2024-56624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56624"
},
{
"name": "CVE-2024-56638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56638"
},
{
"name": "CVE-2024-56653",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56653"
},
{
"name": "CVE-2024-56657",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56657"
},
{
"name": "CVE-2024-56669",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56669"
},
{
"name": "CVE-2024-56710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56710"
},
{
"name": "CVE-2024-56714",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56714"
},
{
"name": "CVE-2024-56772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56772"
},
{
"name": "CVE-2024-56773",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56773"
},
{
"name": "CVE-2024-57878",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57878"
},
{
"name": "CVE-2024-57879",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57879"
},
{
"name": "CVE-2024-57885",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57885"
},
{
"name": "CVE-2025-21644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21644"
},
{
"name": "CVE-2025-21659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21659"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2024-58009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58009"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2022-49057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49057"
},
{
"name": "CVE-2022-49062",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49062"
},
{
"name": "CVE-2022-49064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49064"
},
{
"name": "CVE-2022-49070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49070"
},
{
"name": "CVE-2022-49139",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49139"
},
{
"name": "CVE-2022-49204",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49204"
},
{
"name": "CVE-2022-49205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49205"
},
{
"name": "CVE-2022-49207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49207"
},
{
"name": "CVE-2022-49209",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49209"
},
{
"name": "CVE-2022-49225",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49225"
},
{
"name": "CVE-2022-49228",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49228"
},
{
"name": "CVE-2022-49237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49237"
},
{
"name": "CVE-2022-49330",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49330"
},
{
"name": "CVE-2022-49353",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49353"
},
{
"name": "CVE-2022-49406",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49406"
},
{
"name": "CVE-2022-49436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49436"
},
{
"name": "CVE-2022-49446",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49446"
},
{
"name": "CVE-2022-49476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49476"
},
{
"name": "CVE-2022-49511",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49511"
},
{
"name": "CVE-2022-49518",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49518"
},
{
"name": "CVE-2022-49538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49538"
},
{
"name": "CVE-2022-49548",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49548"
},
{
"name": "CVE-2022-49552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49552"
},
{
"name": "CVE-2022-49560",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49560"
},
{
"name": "CVE-2022-49565",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49565"
},
{
"name": "CVE-2022-49624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49624"
},
{
"name": "CVE-2022-49638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49638"
},
{
"name": "CVE-2022-49655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49655"
},
{
"name": "CVE-2022-49658",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49658"
},
{
"name": "CVE-2022-49697",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49697"
},
{
"name": "CVE-2022-49732",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49732"
},
{
"name": "CVE-2022-49739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49739"
},
{
"name": "CVE-2022-49746",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49746"
},
{
"name": "CVE-2022-49759",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49759"
},
{
"name": "CVE-2023-52933",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52933"
},
{
"name": "CVE-2023-52941",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52941"
},
{
"name": "CVE-2023-52976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52976"
},
{
"name": "CVE-2023-52984",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52984"
},
{
"name": "CVE-2023-52992",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52992"
},
{
"name": "CVE-2023-52993",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52993"
},
{
"name": "CVE-2023-53006",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53006"
},
{
"name": "CVE-2023-53007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53007"
},
{
"name": "CVE-2023-53015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53015"
},
{
"name": "CVE-2023-53016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53016"
},
{
"name": "CVE-2023-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53019"
},
{
"name": "CVE-2023-53026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53026"
},
{
"name": "CVE-2023-53029",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53029"
},
{
"name": "CVE-2023-53030",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53030"
},
{
"name": "CVE-2023-53033",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53033"
},
{
"name": "CVE-2024-46736",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46736"
},
{
"name": "CVE-2024-46796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46796"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2025-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21876"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-21886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21886"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2025-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21938"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2022-49220",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49220"
},
{
"name": "CVE-2022-49372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49372"
},
{
"name": "CVE-2022-49578",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49578"
},
{
"name": "CVE-2022-49589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49589"
},
{
"name": "CVE-2022-49620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49620"
},
{
"name": "CVE-2023-52997",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52997"
},
{
"name": "CVE-2023-53031",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53031"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-21953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21953"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49171",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49171"
},
{
"name": "CVE-2022-49197",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49197"
},
{
"name": "CVE-2022-49561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49561"
},
{
"name": "CVE-2022-49590",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49590"
},
{
"name": "CVE-2023-52928",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52928"
},
{
"name": "CVE-2023-52937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52937"
},
{
"name": "CVE-2023-52938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52938"
},
{
"name": "CVE-2023-52981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52981"
},
{
"name": "CVE-2023-52982",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52982"
},
{
"name": "CVE-2023-52986",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52986"
},
{
"name": "CVE-2023-53009",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53009"
},
{
"name": "CVE-2023-53032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53032"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-21906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21906"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58074",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58074"
},
{
"name": "CVE-2025-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21974"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21939"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2024-57987",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57987"
},
{
"name": "CVE-2024-57988",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57988"
},
{
"name": "CVE-2024-57995",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57995"
},
{
"name": "CVE-2024-58015",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58015"
},
{
"name": "CVE-2024-58062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58062"
},
{
"name": "CVE-2025-21713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21713"
},
{
"name": "CVE-2025-21770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21770"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-47316",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-47316"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
}
],
"initial_release_date": "2025-12-02T00:00:00",
"last_revision_date": "2025-12-02T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1057",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36560",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36560"
},
{
"published_at": "2025-12-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36564",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36564"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis - Published: 2025-11-06 - Updated: 2025-11-06
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
GHSA-RVJ2-9P3C-WMWH
Vulnerability from github – Published: 2022-03-15 00:00 – Updated: 2022-03-22 00:00Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.
{
"affected": [],
"aliases": [
"CVE-2021-44964"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-03-14T15:15:00Z",
"severity": "MODERATE"
},
"details": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
"id": "GHSA-rvj2-9p3c-wmwh",
"modified": "2022-03-22T00:00:53Z",
"published": "2022-03-15T00:00:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
},
{
"type": "WEB",
"url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
},
{
"type": "WEB",
"url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
},
{
"type": "WEB",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"type": "WEB",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
},
{
"type": "WEB",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
RHSA-2023_0957
Vulnerability from csaf_redhat - Published: 2023-02-28 08:22 - Updated: 2024-11-22 22:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for lua is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0957",
"url": "https://access.redhat.com/errata/RHSA-2023:0957"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2047672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
},
{
"category": "external",
"summary": "2064772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0957.json"
}
],
"title": "Red Hat Security Advisory: lua security update",
"tracking": {
"current_release_date": "2024-11-22T22:01:26+00:00",
"generator": {
"date": "2024-11-22T22:01:26+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:0957",
"initial_release_date": "2023-02-28T08:22:18+00:00",
"revision_history": [
{
"date": "2023-02-28T08:22:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-28T08:22:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T22:01:26+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.src",
"product": {
"name": "lua-0:5.4.4-2.el9_1.src",
"product_id": "lua-0:5.4.4-2.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.i686",
"product_id": "lua-libs-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-0:5.4.4-2.el9_1.i686",
"product_id": "lua-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.i686",
"product_id": "lua-devel-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-libs-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-devel-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
},
"product_reference": "lua-0:5.4.4-2.el9_1.src",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
},
"product_reference": "lua-0:5.4.4-2.el9_1.src",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
},
"product_reference": "lua-0:5.4.4-2.el9_1.src",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43519",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2047672"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43519"
},
{
"category": "external",
"summary": "RHBZ#2047672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-28T08:22:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0957"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
},
{
"cve": "CVE-2021-44964",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064772"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lua: use after free allows Sandbox Escape",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44964"
},
{
"category": "external",
"summary": "RHBZ#2064772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
},
{
"category": "external",
"summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"category": "external",
"summary": "https://www.lua.org/bugs.html#5.4.4-1",
"url": "https://www.lua.org/bugs.html#5.4.4-1"
}
],
"release_date": "2021-11-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-28T08:22:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0957"
},
{
"category": "workaround",
"details": "Ensure that the Lua interpreter runs only trusted scripts.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "lua: use after free allows Sandbox Escape"
}
]
}
RHSA-2023:1211
Vulnerability from csaf_redhat - Published: 2023-03-14 14:00 - Updated: 2025-11-21 18:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for lua is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nThe following packages have been upgraded to a later upstream version: lua (5.4.4).\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1211",
"url": "https://access.redhat.com/errata/RHSA-2023:1211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2047672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
},
{
"category": "external",
"summary": "2064772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1211.json"
}
],
"title": "Red Hat Security Advisory: lua security update",
"tracking": {
"current_release_date": "2025-11-21T18:38:25+00:00",
"generator": {
"date": "2025-11-21T18:38:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:1211",
"initial_release_date": "2023-03-14T14:00:18+00:00",
"revision_history": [
{
"date": "2023-03-14T14:00:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-14T14:00:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:38:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.src",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.src",
"product_id": "lua-0:5.4.4-1.el9_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.src",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43519",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2047672"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43519"
},
{
"category": "external",
"summary": "RHBZ#2047672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-14T14:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1211"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
},
{
"cve": "CVE-2021-44964",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064772"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lua: use after free allows Sandbox Escape",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44964"
},
{
"category": "external",
"summary": "RHBZ#2064772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
},
{
"category": "external",
"summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"category": "external",
"summary": "https://www.lua.org/bugs.html#5.4.4-1",
"url": "https://www.lua.org/bugs.html#5.4.4-1"
}
],
"release_date": "2021-11-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-14T14:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1211"
},
{
"category": "workaround",
"details": "Ensure that the Lua interpreter runs only trusted scripts.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lua: use after free allows Sandbox Escape"
}
]
}
RHSA-2023:0957
Vulnerability from csaf_redhat - Published: 2023-02-28 08:22 - Updated: 2025-11-21 18:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for lua is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:0957",
"url": "https://access.redhat.com/errata/RHSA-2023:0957"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2047672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
},
{
"category": "external",
"summary": "2064772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_0957.json"
}
],
"title": "Red Hat Security Advisory: lua security update",
"tracking": {
"current_release_date": "2025-11-21T18:38:05+00:00",
"generator": {
"date": "2025-11-21T18:38:05+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:0957",
"initial_release_date": "2023-02-28T08:22:18+00:00",
"revision_history": [
{
"date": "2023-02-28T08:22:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-02-28T08:22:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:38:05+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.src",
"product": {
"name": "lua-0:5.4.4-2.el9_1.src",
"product_id": "lua-0:5.4.4-2.el9_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.aarch64",
"product": {
"name": "lua-0:5.4.4-2.el9_1.aarch64",
"product_id": "lua-0:5.4.4-2.el9_1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.ppc64le",
"product": {
"name": "lua-0:5.4.4-2.el9_1.ppc64le",
"product_id": "lua-0:5.4.4-2.el9_1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.i686",
"product_id": "lua-libs-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-0:5.4.4-2.el9_1.i686",
"product_id": "lua-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.i686",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.i686",
"product_id": "lua-devel-0:5.4.4-2.el9_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.x86_64",
"product": {
"name": "lua-0:5.4.4-2.el9_1.x86_64",
"product_id": "lua-0:5.4.4-2.el9_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-libs-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-libs-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-devel-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-devel-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-2.el9_1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-2.el9_1.s390x",
"product": {
"name": "lua-0:5.4.4-2.el9_1.s390x",
"product_id": "lua-0:5.4.4-2.el9_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-2.el9_1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
},
"product_reference": "lua-0:5.4.4-2.el9_1.src",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "AppStream-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
},
"product_reference": "lua-0:5.4.4-2.el9_1.src",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "BaseOS-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src"
},
"product_reference": "lua-0:5.4.4-2.el9_1.src",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"relates_to_product_reference": "CRB-9.1.0.Z.MAIN"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43519",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2047672"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43519"
},
{
"category": "external",
"summary": "RHBZ#2047672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-28T08:22:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0957"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
},
{
"cve": "CVE-2021-44964",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064772"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lua: use after free allows Sandbox Escape",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44964"
},
{
"category": "external",
"summary": "RHBZ#2064772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
},
{
"category": "external",
"summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"category": "external",
"summary": "https://www.lua.org/bugs.html#5.4.4-1",
"url": "https://www.lua.org/bugs.html#5.4.4-1"
}
],
"release_date": "2021-11-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-02-28T08:22:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:0957"
},
{
"category": "workaround",
"details": "Ensure that the Lua interpreter runs only trusted scripts.",
"product_ids": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"AppStream-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"AppStream-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"BaseOS-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"BaseOS-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.src",
"CRB-9.1.0.Z.MAIN:lua-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debuginfo-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-debugsource-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-devel-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-0:5.4.4-2.el9_1.x86_64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.aarch64",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.i686",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.ppc64le",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.s390x",
"CRB-9.1.0.Z.MAIN:lua-libs-debuginfo-0:5.4.4-2.el9_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "lua: use after free allows Sandbox Escape"
}
]
}
RHSA-2023_1211
Vulnerability from csaf_redhat - Published: 2023-03-14 14:00 - Updated: 2024-11-22 22:01Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for lua is now available for Red Hat Enterprise Linux 9.0 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The lua packages provide support for Lua, a powerful light-weight programming language designed for extending applications. Lua is also frequently used as a general-purpose, stand-alone language.\n\nThe following packages have been upgraded to a later upstream version: lua (5.4.4).\n\nSecurity Fix(es):\n\n* lua: use after free allows Sandbox Escape (CVE-2021-44964)\n\n* lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file (CVE-2021-43519)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:1211",
"url": "https://access.redhat.com/errata/RHSA-2023:1211"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "2047672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
},
{
"category": "external",
"summary": "2064772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_1211.json"
}
],
"title": "Red Hat Security Advisory: lua security update",
"tracking": {
"current_release_date": "2024-11-22T22:01:36+00:00",
"generator": {
"date": "2024-11-22T22:01:36+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:1211",
"initial_release_date": "2023-03-14T14:00:18+00:00",
"revision_history": [
{
"date": "2023-03-14T14:00:18+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-03-14T14:00:18+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T22:01:36+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.0::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product": {
"name": "Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.0::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.src",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.src",
"product_id": "lua-0:5.4.4-1.el9_0.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debugsource@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-debuginfo@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-libs-debuginfo@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua@5.4.4-1.el9_0.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"product": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"product_id": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/lua-devel@5.4.4-1.el9_0.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.0)",
"product_id": "AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.src as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.src",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-devel-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64 as a component of Red Hat CodeReady Linux Builder EUS (v.9.0)",
"product_id": "CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
},
"product_reference": "lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"relates_to_product_reference": "CRB-9.0.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-43519",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2022-01-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2047672"
}
],
"notes": [
{
"category": "description",
"text": "A stack overflow issue was discovered in Lua in the lua_resume() function of \u0027ldo.c\u0027. This flaw allows a local attacker to pass a specially crafted file to the Lua Interpreter, causing a crash that leads to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability does not affect Red Hat Enterprise Linux 8, because code-base was completely rewritten between 5.3 and 5.4. So, RHEL-8 is unlikely to be affected by this or a similar issue.\n\nThis flaw is marked as Out-of-Support-Scope for Red Hat Enterprise Linux 6 and 7 because the flaw impact is moderate. For additional information, refer to the Red Hat Enterprise Linux Life Cycle \u0026 Update Policy: https://access.redhat.com/support/policy/updates/errata/.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-43519"
},
{
"category": "external",
"summary": "RHBZ#2047672",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2047672"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-43519",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43519"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-43519"
}
],
"release_date": "2021-11-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-14T14:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1211"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "lua: stack overflow in lua_resume of ldo.c allows a DoS via a crafted script file"
},
{
"cve": "CVE-2021-44964",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2022-03-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2064772"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Lua interpreter. This flaw allows an attacker who can have a malicious script executed by the interpreter, to cause a use-after-free issue that may result in a sandbox escape.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lua: use after free allows Sandbox Escape",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This flaw does not affect versions of Lua shipped with Red Hat Enterprise Linux 6, 7, or 8; the vulnerable code was introduced in a subsequent version of Lua.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2021-44964"
},
{
"category": "external",
"summary": "RHBZ#2064772",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2064772"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-44964"
},
{
"category": "external",
"summary": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html",
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"category": "external",
"summary": "https://www.lua.org/bugs.html#5.4.4-1",
"url": "https://www.lua.org/bugs.html#5.4.4-1"
}
],
"release_date": "2021-11-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-03-14T14:00:18+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:1211"
},
{
"category": "workaround",
"details": "Ensure that the Lua interpreter runs only trusted scripts.",
"product_ids": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"AppStream-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"AppStream-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"BaseOS-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"BaseOS-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.src",
"CRB-9.0.0.Z.EUS:lua-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debuginfo-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-debugsource-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-devel-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-0:5.4.4-1.el9_0.1.x86_64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.aarch64",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.i686",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.ppc64le",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.s390x",
"CRB-9.0.0.Z.EUS:lua-libs-debuginfo-0:5.4.4-1.el9_0.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lua: use after free allows Sandbox Escape"
}
]
}
MSRC_CVE-2021-44964
Vulnerability from csaf_microsoft - Published: 2022-03-02 00:00 - Updated: 2025-07-11 00:00Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2021-44964 Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2021-44964.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file.",
"tracking": {
"current_release_date": "2025-07-11T00:00:00.000Z",
"generator": {
"date": "2025-10-19T23:23:33.133Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2021-44964",
"initial_release_date": "2022-03-02T00:00:00.000Z",
"revision_history": [
{
"date": "2022-03-21T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2023-06-03T00:00:00.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
},
{
"date": "2025-07-11T00:00:00.000Z",
"legacy_version": "2",
"number": "3",
"summary": "Added memcached to CBL-Mariner 2.0\nAdded ntopng to CBL-Mariner 2.0\nAdded lua to CBL-Mariner 2.0"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 lua 5.4.4-1",
"product": {
"name": "\u003ccbl2 lua 5.4.4-1",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cbl2 lua 5.4.4-1",
"product": {
"name": "cbl2 lua 5.4.4-1",
"product_id": "19468"
}
}
],
"category": "product_name",
"name": "lua"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 ntopng 5.2.1-3",
"product": {
"name": "\u003ccbl2 ntopng 5.2.1-3",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 ntopng 5.2.1-3",
"product": {
"name": "cbl2 ntopng 5.2.1-3",
"product_id": "19878"
}
}
],
"category": "product_name",
"name": "ntopng"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 memcached 1.6.22-2",
"product": {
"name": "\u003ccbl2 memcached 1.6.22-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 memcached 1.6.22-2",
"product": {
"name": "cbl2 memcached 1.6.22-2",
"product_id": "19882"
}
}
],
"category": "product_name",
"name": "memcached"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 lua 5.4.4-1 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 lua 5.4.4-1 as a component of CBL Mariner 2.0",
"product_id": "19468-17086"
},
"product_reference": "19468",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 ntopng 5.2.1-3 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 ntopng 5.2.1-3 as a component of CBL Mariner 2.0",
"product_id": "19878-17086"
},
"product_reference": "19878",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 memcached 1.6.22-2 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 memcached 1.6.22-2 as a component of CBL Mariner 2.0",
"product_id": "19882-17086"
},
"product_reference": "19882",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-44964",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "general",
"text": "mitre",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19468-17086",
"19878-17086",
"19882-17086"
],
"known_affected": [
"17086-3",
"17086-2",
"17086-1"
],
"under_investigation": [
"17084-5",
"17084-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-44964 Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file. - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2022/msrc_cve-2021-44964.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2022-03-21T00:00:00.000Z",
"details": "5.4.4-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2022-03-21T00:00:00.000Z",
"details": "5.2.1-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2022-03-21T00:00:00.000Z",
"details": "1.6.22-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 6.3,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"17086-3",
"17086-2",
"17086-1"
]
}
],
"title": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
}
]
}
FKIE_CVE-2021-44964
Vulnerability from fkie_nvd - Published: 2022-03-14 15:15 - Updated: 2024-11-21 06:31| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://lua-users.org/lists/lua-l/2021-11/msg00186.html | Exploit, Mailing List, Technical Description, Vendor Advisory | |
| cve@mitre.org | http://lua-users.org/lists/lua-l/2021-12/msg00007.html | Exploit, Mailing List, Vendor Advisory | |
| cve@mitre.org | http://lua-users.org/lists/lua-l/2021-12/msg00015.html | Mailing List, Vendor Advisory | |
| cve@mitre.org | http://lua-users.org/lists/lua-l/2021-12/msg00030.html | Mailing List, Vendor Advisory | |
| cve@mitre.org | https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lua-users.org/lists/lua-l/2021-11/msg00186.html | Exploit, Mailing List, Technical Description, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lua-users.org/lists/lua-l/2021-12/msg00007.html | Exploit, Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lua-users.org/lists/lua-l/2021-12/msg00015.html | Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://lua-users.org/lists/lua-l/2021-12/msg00030.html | Mailing List, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability | Exploit, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:lua:lua:*:*:*:*:*:*:*:*",
"matchCriteriaId": "36E29101-6009-4A41-AF33-FDD5EA753F91",
"versionEndIncluding": "5.4.3",
"versionStartIncluding": "5.4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Use after free in garbage collector and finalizer of lgc.c in Lua interpreter 5.4.0~5.4.3 allows attackers to perform Sandbox Escape via a crafted script file."
},
{
"lang": "es",
"value": "Un uso de memoria previamente liberada en el recolector de basura y en el finalizador de lgc.c en el int\u00e9rprete de Lua versiones 5.4.0~5.4.3, permite a atacantes llevar a cabo un Escape del Sandbox por medio de un archivo de script dise\u00f1ado"
}
],
"id": "CVE-2021-44964",
"lastModified": "2024-11-21T06:31:44.853",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2022-03-14T15:15:09.373",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Technical Description",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Technical Description",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-11/msg00186.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Mailing List",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00015.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List",
"Vendor Advisory"
],
"url": "http://lua-users.org/lists/lua-l/2021-12/msg00030.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/Lua-Project/lua-5.4.4-sandbox-escape-with-new-vulnerability"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.